Implementation On Privacy-Preserving Public Auditing for Shared Data in the Cloud

Authors

  • Urja Upadhyay  Computer Science & Engineering, Nagpur University, Nagpur, Maharashtra, India
  • Disha Jaiswal  Computer Science & Engineering, Nagpur University, Nagpur, Maharashtra, India
  • Neha Kumari  Computer Science & Engineering, Nagpur University, Nagpur, Maharashtra, India
  • Bhagyashri Jawale  Computer Science & Engineering, Nagpur University, Nagpur, Maharashtra, India

Keywords:

Data Storage, Privacy-Preserving, Public Auditability, Cloud Computing, Third Party Auditing(TPA).

Abstract

In cloud computing, the way that organizations manage their data, due to its low cost and ubiquitous nature. Users access the application and enjoy the on-demand high quality information’s and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. This paper introduces a cloud database storage architecture, this approach prevents the risk of both external and internal attack to the outsourced data. the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. Enhanced and secured third-party auditing, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. furthermore, TPA is trusted and capable of accessing the cloud storage to performed auditing. extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently, Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient. Our preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

References

  1. S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski,Top-k Retrieval from a Confidential Index," Proc. Int'l Conf. Extending Database Technology: Advances in Database Technology (EDBT '09), 2009.
  2. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy Keyword Search over Encrypted Data in Cloud Computing," Proc. IEEE Infocom '10, 2010.
  3. N. Cao, C. Wang, K. Ren, and W. Lou, "Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data," Proc. IEEE Infocom '11, 2011.
  4. C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, "Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data," Proc. IEEE INFOCOM, 2012.
  5. Cong Wang, Ning Cao, KuiRen and Wenjing Lou, "Enabling Secure and Efficient Rank Keyword Search over Outsourced Cloud Data" IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 8, August 2012.
  6. Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," To appear, IEEE Transactions on Service Computing (TSC).
  7. A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Order-preserving symmetric encryption. In Proceedings of Eurocrypt'09, volume 5479 of LNCS. Springer, 2009.
  8. M. Li, S. Yu, N. Cao, and W. Lou. Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 383–392. IEEE, 2011.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Urja Upadhyay, Disha Jaiswal, Neha Kumari, Bhagyashri Jawale, " Implementation On Privacy-Preserving Public Auditing for Shared Data in the Cloud , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.410-414, March-April-2018.