SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1022
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in
Public Cloud
Tanmay Borkar1, Mangesh Dudhal2, Snehal Ghadage3, Sumit Kawale4
1, 2, 3 & 4Dept. of Computer Engineering, NBN Sinhgad School of Engineering, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In today’s modern era, each & every person is
connected to Cloud Infrastructure for storing his huge data
sets due to rapid development in Cloud Computing. Cloud
Services are getting very prominent but introduction to new
threats &security issues restricts users from uploadingdatato
cloud. When a user is restricted to upload a data, he/she will
alter his proxy & to upload his data to Cloud Environment.
Uploading data with proxy alteration, also introduces new
treats like Data stealing & uploading malware on Cloud
Infrastructure. Furthermore,remoteintegritycheckingof data
is also an major security issue in public cloudstorage. Itmakes
client monitor his/her data set's integrity without actually
downloading it. To counter such issues, we present a
Cryptographic Proxy Oriented Data Uploading to avoid data
from fake sources & algorithms to protect user data from
external or internal threats.
Key Words: Cloud Computing, ID-PUIC, Proxy Orientation,
Malware Detection, Data Integrity, Key Generation,
Encryption & Decryption.
1. INTRODUCTION
Due to rapid progress in cloud computing, many
users prefer to save their data to public cloudservers.Newly
developed security problems have to be solved to help as
many clients as possible to compute their data in public
cloud. When the client is restricted to access Public Cloud
Server, he/she will alter its proxy to process his data &
upload them.
In addition to this, checking of remote data integrity is the
most trivial security issue in public cloud storage. It ensures
that the client data are kept undamaged without
downloading the whole data.
Based on security problems, we propose a system called
proxy-oriented data uploading and remote data integrity
checking system using identity-based public key
cryptography: remote data integrity checkinginpubliccloud
and identity-basedproxy-orienteddata uploading(ID-PUIC).
We design a system & security model that is robust ID-PUIC
protocol which is efficient to counter visible problems. The
proposed ID-PUIC protocol is securely based on thestiffness
of computational Diffie–Hellmanproblem.Thisproposed ID-
PUIC protocol is not only efficient but also flexible.
Depending on the client’s authorization, the proposed ID-
PUIC protocol can perform checking of private remote
integrity of data to avoid any anonymous data from false
sources and maintain protection of data integrity.
2. EXISTING SYSTEM
Now a day’s most of the users over internet use public cloud
to upload and store their data. In fact, users prefers to store
huge amount of data on PCS (public cloud system), it may be
normal photographs or files to a large amount of a secret
data of a company or corporates. Once it is uploaded by
client on PCS, then its data integrity is checked over the
internet and this causes the problem for most of the times.
For example, let say in case of small organization where
individual manager uploads secret and commercial data on
PCS and later on the same manager found in commercial
fraud of the organization then obviously he/she may not be
able to access the public cloudnetwork againstsafeguarding
the business. But even if he/she can’t be able to process the
huge data over a time period then the company will be in
serious issues so he/she has to appoint someloyal person so
that they can process the data. But in this case also the
manager will not be sure on his/her delegates whether they
can process the data integrity correctly and efficiently.
Publicly checking the data integritymayleadtoprivacyissue
of data leaking over PCS. The data stored on PCS may lead to
malicious activities. As the data uploaded on PCS is very
confidential and has to be kept secured. So there has to be a
provision of private data integrity whichcanbeonlydone by
a Manager or his/her level person of an organization. So
he/she has to appoint someone as a proxy to check the data
integrity part. So we will be having a remote data integrity
checking, through a protocol, which will be done by certain
certificate management. When the person like Manager
delegate the data integrity part over PCS, then the delegate
has to check the data integrity through the certificates
checking and validity each time.
3. DISADVANTAGES OF EXISTING SYSTEM
1. In case of Public Key Infrastructure, weneedtotake
care of lot of things like certificate generation, its
verification, revocationofcertificateanditsrenewal
which increases the time complexity and overhead
on PCS.
2. In PCS, the other devices like IPADS, Tablets and
mobile phone may result into low computational
capacity.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1023
4. LITERATURE REVIEW
In today's digital era, cloudcomputingplaysa significant
role in storage of data. The substantial developmentincloud,
solves many issues of storing enormous static or runtime
datasets. Along with advantages, it contains much
vulnerability. It is more prone to maliciously uploading of
data & data theft attacks. It also contains vulnerability of
monitoring the erectness of uploaded data.
Customers tend to upload, store and retrieve all their
essential data and information through the cloud service
providers that is CPSs using distributed computing. New
security issues come across that whetherthedata issafe,isit
from a trusted user, etc. Data honesty is also another issue
which needs to be overlooked. Issues of checking whether
the data is kept in a safe location or not is also needed to be
checked. To overcome such issues Remote Integrity
information system is used. In the paper the use of Identity
based Proxy oriented data uploading and remote data
integrity checking (ID-PUIC) protocol is proposed. This is
effective and adaptable and can understand the private
remote information honesty checking, and open remote
information honour checking. Customers store their large
data/information in the remote open cloud servers while
using the cloud computing concept. It does not guarantee
whether the data is stored in right place. Thus, remote
information integrity checking enables the customers to
understand the storage of information and location of
information. Due to its limitations, owner's information is
known to limited people. Using the real client’s permission
or authorization this protocol ensures the private checking
and public checking respectively.
5. PROPOSED SYSTEM
The area remote data integrity checking and identity
based proxy oriented data uploading is focused in this
project. As the certificate management is eliminated, with
the use of identity based public key cryptologyourproposed
ID-PUIC protocol is efficient.
ID-PUIC is remote data integrity checking model in
public cloud as well as a novel proxy oriented data
uploading. We give the formal system model and security
model for ID-PUIC protocol.
The first ID-PUIC protocol was designed on the basis of
bilinear pairing. Our ID-PUIC model is proven tobesecurein
the random oracle model. Our protocol can realized
delegated checking, private checking and public checking
based on the original client authorization.
6. ADVANTAGES OF PROPOSED SYSTEM
1. The efficiency of our system is improved coz we are
implementing data integrity onPCSthrougha proxy
oriented data upload.
2. The main advantage of our system is that securityis
improved as we are implementing identity based
proxy oriented schemefordata uploadingthrougha
concrete ID-PUIC protocol which is secure and
efficient.
7. SYSTEM ARCHITECTURE
Fig. 1. System Architecture
The concrete ID-PUIC protocol comprises four procedures:
Setup, Extract, Proxy-key generation, TagGen, and Proof. In
order to show the intuition of our construction, the concrete
protocol's architecture is depicted in Figure 1. First, Setup is
performed and the system parameters are generated. Based
on the generated system parameters, the other procedures
are performed as Figure 1. It is described below:
(1) In the phase Extract, when the entity's identity is input,
KGC generates the entity's private key. Especially, it can
generate the private keys for the client and the proxy.
(2) In the phase Proxy-key generation, the original client
creates the warrant and helps the proxy generate the proxy
key.
(3) In the phase TagGen, when the data block is input, the
proxy generates the block’s tag and uploads block-tag pairs
to PCS.
(4) In the phase Proof, the original client O interacts with
PCS. Through the interaction, O checks its remote data
integrity
Fig. 2. Working
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1024
8. CONCLUSION
In this paper, we introduce proxy based data uploading
concept and have successfully implemented in public cloud.
Furthermore, we have also introduced malware detection
while uploading the data to cloud and have successfully
implemented the feature that can correct the malware on its
detection. In addition to this, our system has even
successfully ingrained the ability to check the robustness of
data placed in public cloud with downloading the whole
contents for robust test.
In general, the systemproposedinthispaperisdesigned
to be responsive and adaptive to run time data variety and
protection from malicious file without explicitly
programmed.
9. REFERENCES
[1] Z. Fu, X. Sun, Q. Liu, L. Zhou, J. Shu, Achieving efficient
cloud search services: multi-keyword ranked search over
encrypted cloud data sup-porting parallel computing, IEICE
Transactions on Communications, vol. E98-B, no. 1, pp.190-
200, 2015.
[2] Y. Ren, J. Shen, J. Wang, J. Han, S. Lee, Mutual verifiable
provable data auditing in public cloud storage, Journal of
Internet Technology, vol. 16, no. 2, pp. 317-323, 2015.
[3] A. Marnerides, C. James, A. Schaeffer, S. Sait, A. Mauthe,
and H. Murthy, Multi-level network resilience: Traffic
analysis, anomaly detection and simulation, ICTACT Journal
on Communication Technology, Special Issue on Next
Generation Wireless Networks and Applications, vol. 2, pp.
345356, June 2011.
[4] M.Mambo, K. Usuda, E. Okamoto, Proxy signature for
delegating signing operation, CCS 1996, pp. 48C57, 1996.
[5] E. Zhou and Z. Li, An improved remote data possession
checking protocol in cloud storage, in Algorithms and
Architectures for Parallel Processing.
[6] H. Wang, Proxy provable data possession in public
clouds,• IEEE Transactions on Services Computing, vol. 6,
no. 4, pp. 551-559, 2013.
Ad

More Related Content

What's hot (20)

Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
IRJET Journal
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
sarfraznawaz
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Pvrtechnologies Nellore
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
IRJET Journal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
LeMeniz Infotech
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
Splunk
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
IRJET Journal
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
0011sas security whitepaper
0011sas security whitepaper0011sas security whitepaper
0011sas security whitepaper
CMR WORLD TECH
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
IRJET Journal
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
sarfraznawaz
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Pvrtechnologies Nellore
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
IRJET Journal
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
LeMeniz Infotech
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
Splunk
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
IRJET Journal
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
0011sas security whitepaper
0011sas security whitepaper0011sas security whitepaper
0011sas security whitepaper
CMR WORLD TECH
 
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage GroupsEnabling Secure Data Sharing Scheme in the Cloud Storage Groups
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
IRJET Journal
 

Similar to Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud (20)

Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
1crore projects
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET Journal
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET Journal
 
a novel approach for data uploading
a novel approach for data uploadinga novel approach for data uploading
a novel approach for data uploading
IJAEMSJORNAL
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
IJSRED
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud StorageIdentity-Based Distributed Provable Data Possession in Multicloud Storage
Identity-Based Distributed Provable Data Possession in Multicloud Storage
1crore projects
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
Editor IJCATR
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET Journal
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET Journal
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET Journal
 
a novel approach for data uploading
a novel approach for data uploadinga novel approach for data uploading
a novel approach for data uploading
IJAEMSJORNAL
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET Journal
 
Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...Remote data integrity checking with a third party auditor in public cloud usi...
Remote data integrity checking with a third party auditor in public cloud usi...
IJSRED
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud Secure Multi-Owner Group Signature Based Secure M-Health  Records in Cloud
Secure Multi-Owner Group Signature Based Secure M-Health Records in Cloud
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Ijmer 41025357
Ijmer 41025357Ijmer 41025357
Ijmer 41025357
IJMER
 
Ad

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Ad

Recently uploaded (20)

introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
DATA-DRIVEN SHOULDER INVERSE KINEMATICS YoungBeom Kim1 , Byung-Ha Park1 , Kwa...
charlesdick1345
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 

Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1022 Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud Tanmay Borkar1, Mangesh Dudhal2, Snehal Ghadage3, Sumit Kawale4 1, 2, 3 & 4Dept. of Computer Engineering, NBN Sinhgad School of Engineering, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today’s modern era, each & every person is connected to Cloud Infrastructure for storing his huge data sets due to rapid development in Cloud Computing. Cloud Services are getting very prominent but introduction to new threats &security issues restricts users from uploadingdatato cloud. When a user is restricted to upload a data, he/she will alter his proxy & to upload his data to Cloud Environment. Uploading data with proxy alteration, also introduces new treats like Data stealing & uploading malware on Cloud Infrastructure. Furthermore,remoteintegritycheckingof data is also an major security issue in public cloudstorage. Itmakes client monitor his/her data set's integrity without actually downloading it. To counter such issues, we present a Cryptographic Proxy Oriented Data Uploading to avoid data from fake sources & algorithms to protect user data from external or internal threats. Key Words: Cloud Computing, ID-PUIC, Proxy Orientation, Malware Detection, Data Integrity, Key Generation, Encryption & Decryption. 1. INTRODUCTION Due to rapid progress in cloud computing, many users prefer to save their data to public cloudservers.Newly developed security problems have to be solved to help as many clients as possible to compute their data in public cloud. When the client is restricted to access Public Cloud Server, he/she will alter its proxy to process his data & upload them. In addition to this, checking of remote data integrity is the most trivial security issue in public cloud storage. It ensures that the client data are kept undamaged without downloading the whole data. Based on security problems, we propose a system called proxy-oriented data uploading and remote data integrity checking system using identity-based public key cryptography: remote data integrity checkinginpubliccloud and identity-basedproxy-orienteddata uploading(ID-PUIC). We design a system & security model that is robust ID-PUIC protocol which is efficient to counter visible problems. The proposed ID-PUIC protocol is securely based on thestiffness of computational Diffie–Hellmanproblem.Thisproposed ID- PUIC protocol is not only efficient but also flexible. Depending on the client’s authorization, the proposed ID- PUIC protocol can perform checking of private remote integrity of data to avoid any anonymous data from false sources and maintain protection of data integrity. 2. EXISTING SYSTEM Now a day’s most of the users over internet use public cloud to upload and store their data. In fact, users prefers to store huge amount of data on PCS (public cloud system), it may be normal photographs or files to a large amount of a secret data of a company or corporates. Once it is uploaded by client on PCS, then its data integrity is checked over the internet and this causes the problem for most of the times. For example, let say in case of small organization where individual manager uploads secret and commercial data on PCS and later on the same manager found in commercial fraud of the organization then obviously he/she may not be able to access the public cloudnetwork againstsafeguarding the business. But even if he/she can’t be able to process the huge data over a time period then the company will be in serious issues so he/she has to appoint someloyal person so that they can process the data. But in this case also the manager will not be sure on his/her delegates whether they can process the data integrity correctly and efficiently. Publicly checking the data integritymayleadtoprivacyissue of data leaking over PCS. The data stored on PCS may lead to malicious activities. As the data uploaded on PCS is very confidential and has to be kept secured. So there has to be a provision of private data integrity whichcanbeonlydone by a Manager or his/her level person of an organization. So he/she has to appoint someone as a proxy to check the data integrity part. So we will be having a remote data integrity checking, through a protocol, which will be done by certain certificate management. When the person like Manager delegate the data integrity part over PCS, then the delegate has to check the data integrity through the certificates checking and validity each time. 3. DISADVANTAGES OF EXISTING SYSTEM 1. In case of Public Key Infrastructure, weneedtotake care of lot of things like certificate generation, its verification, revocationofcertificateanditsrenewal which increases the time complexity and overhead on PCS. 2. In PCS, the other devices like IPADS, Tablets and mobile phone may result into low computational capacity.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1023 4. LITERATURE REVIEW In today's digital era, cloudcomputingplaysa significant role in storage of data. The substantial developmentincloud, solves many issues of storing enormous static or runtime datasets. Along with advantages, it contains much vulnerability. It is more prone to maliciously uploading of data & data theft attacks. It also contains vulnerability of monitoring the erectness of uploaded data. Customers tend to upload, store and retrieve all their essential data and information through the cloud service providers that is CPSs using distributed computing. New security issues come across that whetherthedata issafe,isit from a trusted user, etc. Data honesty is also another issue which needs to be overlooked. Issues of checking whether the data is kept in a safe location or not is also needed to be checked. To overcome such issues Remote Integrity information system is used. In the paper the use of Identity based Proxy oriented data uploading and remote data integrity checking (ID-PUIC) protocol is proposed. This is effective and adaptable and can understand the private remote information honesty checking, and open remote information honour checking. Customers store their large data/information in the remote open cloud servers while using the cloud computing concept. It does not guarantee whether the data is stored in right place. Thus, remote information integrity checking enables the customers to understand the storage of information and location of information. Due to its limitations, owner's information is known to limited people. Using the real client’s permission or authorization this protocol ensures the private checking and public checking respectively. 5. PROPOSED SYSTEM The area remote data integrity checking and identity based proxy oriented data uploading is focused in this project. As the certificate management is eliminated, with the use of identity based public key cryptologyourproposed ID-PUIC protocol is efficient. ID-PUIC is remote data integrity checking model in public cloud as well as a novel proxy oriented data uploading. We give the formal system model and security model for ID-PUIC protocol. The first ID-PUIC protocol was designed on the basis of bilinear pairing. Our ID-PUIC model is proven tobesecurein the random oracle model. Our protocol can realized delegated checking, private checking and public checking based on the original client authorization. 6. ADVANTAGES OF PROPOSED SYSTEM 1. The efficiency of our system is improved coz we are implementing data integrity onPCSthrougha proxy oriented data upload. 2. The main advantage of our system is that securityis improved as we are implementing identity based proxy oriented schemefordata uploadingthrougha concrete ID-PUIC protocol which is secure and efficient. 7. SYSTEM ARCHITECTURE Fig. 1. System Architecture The concrete ID-PUIC protocol comprises four procedures: Setup, Extract, Proxy-key generation, TagGen, and Proof. In order to show the intuition of our construction, the concrete protocol's architecture is depicted in Figure 1. First, Setup is performed and the system parameters are generated. Based on the generated system parameters, the other procedures are performed as Figure 1. It is described below: (1) In the phase Extract, when the entity's identity is input, KGC generates the entity's private key. Especially, it can generate the private keys for the client and the proxy. (2) In the phase Proxy-key generation, the original client creates the warrant and helps the proxy generate the proxy key. (3) In the phase TagGen, when the data block is input, the proxy generates the block’s tag and uploads block-tag pairs to PCS. (4) In the phase Proof, the original client O interacts with PCS. Through the interaction, O checks its remote data integrity Fig. 2. Working
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1024 8. CONCLUSION In this paper, we introduce proxy based data uploading concept and have successfully implemented in public cloud. Furthermore, we have also introduced malware detection while uploading the data to cloud and have successfully implemented the feature that can correct the malware on its detection. In addition to this, our system has even successfully ingrained the ability to check the robustness of data placed in public cloud with downloading the whole contents for robust test. In general, the systemproposedinthispaperisdesigned to be responsive and adaptive to run time data variety and protection from malicious file without explicitly programmed. 9. REFERENCES [1] Z. Fu, X. Sun, Q. Liu, L. Zhou, J. Shu, Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data sup-porting parallel computing, IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190- 200, 2015. [2] Y. Ren, J. Shen, J. Wang, J. Han, S. Lee, Mutual verifiable provable data auditing in public cloud storage, Journal of Internet Technology, vol. 16, no. 2, pp. 317-323, 2015. [3] A. Marnerides, C. James, A. Schaeffer, S. Sait, A. Mauthe, and H. Murthy, Multi-level network resilience: Traffic analysis, anomaly detection and simulation, ICTACT Journal on Communication Technology, Special Issue on Next Generation Wireless Networks and Applications, vol. 2, pp. 345356, June 2011. [4] M.Mambo, K. Usuda, E. Okamoto, Proxy signature for delegating signing operation, CCS 1996, pp. 48C57, 1996. [5] E. Zhou and Z. Li, An improved remote data possession checking protocol in cloud storage, in Algorithms and Architectures for Parallel Processing. [6] H. Wang, Proxy provable data possession in public clouds,• IEEE Transactions on Services Computing, vol. 6, no. 4, pp. 551-559, 2013.