SlideShare a Scribd company logo
HOMOMORPHIC AUTHENTICATION WITH RANDOM MASKING
TECHNIQUE ENSURING PRIVACY & SECURITY IN CLOUD
COMPUTING
ABSTRACT
Cloud computing may be defined as delivery of product rather than service. Cloud
computing is a internet based computing which enables sharing of services. Many users place
their data in the cloud. However, the fact that users no longer have physical possession of the
possibly large size of outsourced data makes the data integrity protection in cloud computing a
very challenging and potentially formidable task, especially for users with constrained
computing resources and capabilities. So correctness of data and security is a prime concern.
This article studies the problem of ensuring the integrity and security of data storage in Cloud
Computing. Security in cloud is achieved by signing the data block before sending to the cloud.
Signing is performed using algorithm which is more secure compared to other algorithms. To
ensure the correctness of data, we consider an external auditor called as third party auditor
(TPA), on behalf of the cloud user, to verify the integrity of the data stored in the cloud. By
utilizing public key based homomorphism authenticator with random masking privacy
preserving public auditing can be achieved. The technique of bilinear aggregate signature is used
to achieve batch auditing. Batch auditing reduces the computation overhead. Extensive security
and performance analysis shows the proposed schemes are provably secure and highly efficient.
ALGORITHM:
BLS: Boneh–Lynn–Shacham
Signing is performed using Boneh–Lynn–Shacham (BLS) algorithm which is more secure
compared to other algorithms. To ensure the correctness of data, we consider an external auditor
called as third party auditor (TPA), on behalf of the cloud user, to verify the integrity of the data
stored in the cloud. By utilizing public key based homomorphic authenticator with random
masking privacy preserving public auditing can be achieved. The technique of bilinear aggregate
signature is used to achieve batch auditing. Batch auditing reduces the computation overhead.
Extensive security and performance analysis shows the proposed schemes are provably secure
MODULES:
1. System Model:
Third Party Auditor (TPA): an optional TPA, who has expertise and capabilities that users may
not have, is trusted to assess and expose risk of cloud storage services on behalf of the users
upon request.
1. It supports an external auditor to audit the user’s outsourced data without learning
knowledge on the data content.
2. Achieves batch auditing where multiple delegated auditing asks from different users can
be performed simultaneously by the TPA.
3. Also supports dynamic operations on data blocks i.e. data update, append and delete.
2. File Retrieval and Error Recovery:
Since our layout of file matrix is systematic, the user can reconstruct the original file by
downloading the data vectors from the first m servers, assuming that they return the correct
response values. Notice that our verification scheme is based on random spot-checking, so the
storage correctness assurance is a probabilistic one. We can guarantee the successful file retrieval
with high probability. On the other hand, whenever the data corruption is detected, the
comparison of pre-computed tokens and received response values can guarantee the
identification of misbehaving server(s).
3. Operations:
(1) Update Operation
In cloud data storage, sometimes the user may need to modify some data block(s) stored in the
cloud, we refer this operation as data update. In other words, for all the unused tokens, the user
needs to exclude every occurrence of the old data block and replace it with the new one.
(2) Delete Operation
Sometimes, after being stored in the cloud, certain data blocks may need to be deleted. The
delete operation we are considering is a general one, in which user replaces the data block with
zero or some special reserved data symbol. From this point of view, the delete operation is
actually a special case of the data update operation, where the original data blocks can be
replaced with zeros or some predetermined special blocks.
(3) Append Operation
In some cases, the user may want to increase the size of his stored data by adding blocks at the
end of the data file, which we refer as data append. We anticipate that the most frequent append
operation in cloud data storage is bulk append, in which the user needs to upload a large number
of blocks (not a single block) at one time.
EXISTING SYSTEM:
The audit from TPA demands retrieval of user’s data, which should be prohibitive
because it violates the privacy-preserving guarantee.
Its communication and computation complexity are both linear with respect to the sampled data
size, which may result in large communication overhead and time delay, especially when the
bandwidth available between the TPA and the cloud server is limited.
In contrast to traditional solutions, where the IT services are under proper physical, logical and
personnel controls, Cloud Computing moves the application software and databases to the large
data centers, where the management of the data and services
May not be fully trustworthy. This unique attribute, however, poses many new security
challenges which have not been well understood.
PROPOSED SYSTEM:
We consider an external auditor called as third party auditor (TPA), on behalf of the
cloud user, to verify the integrity of the data stored in the cloud. By utilizing public key based
homomorphic authenticator with random masking privacy preserving public auditing can be
achieved. The technique of bilinear aggregate signature is used to achieve batch auditing. Batch
auditing reduces
the computation overhead. Extensive security and performance analysis shows the proposed
schemes are provably secure and highly efficient.
We are going to tackle the problem of how to enable a privacy-preserving third-party auditing
protocol, independent to data encryption in this paper. Besides, with the prevalence of Cloud
Computing, a foreseeable increase of auditing tasks from different users may be delegated to
TPA.
Technical contribution in this paper is summarized as follows:
1. It supports an external auditor to audit the user’s outsourced data without learning
knowledge on the data content.
2. Achieves batch auditing where multiple delegated auditing asks from different users
can be performed simultaneously by the TPA.
3. Also supports dynamic operations on data blocks i.e. data update, append and delete.

More Related Content

PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
DOC
Oruta privacy preserving public auditing for shared data in the cloud
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
PPTX
Privacy preserving public auditing
PDF
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PDF
Towards Secure and Dependable Storage Services in Cloud Computing
PPTX
Towards secure and dependable storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Oruta privacy preserving public auditing for shared data in the cloud
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Towards Secure and Dependable Storage Services in Cloud Computing
Towards secure and dependable storage

What's hot (20)

DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
PPT
Privacy preserving public auditing for regenerating-code-based
DOCX
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
DOC
Oruta privacy preserving public auditing
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
DOCX
Oruta privacy preserving public auditing for shared data in the cloud
PPTX
Panda public auditing for shared data with efficient user revocation in the c...
PDF
Privacy preserving public auditing for regenerating code based cloud storage
PPTX
Oruta ppt
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOCX
Privacy preserving public auditing for secure cloud storage
PDF
Public integrity auditing for shared dynamic cloud data with group user revoc...
PPTX
Secure erasure code based cloud storage system with secure data forwarding
PPT
PPT
Privacy preserving public auditing for secure cloud storage
PPTX
data storage security technique for cloud computing
PPT
Towards secure and dependable storage service in cloud
DOCX
secure data transfer and deletion from counting bloom filter in cloud computing.
PDF
Privacy preserving public auditing for secure cloud storage
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Oruta privacy preserving public auditing
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Oruta privacy preserving public auditing for shared data in the cloud
Panda public auditing for shared data with efficient user revocation in the c...
Privacy preserving public auditing for regenerating code based cloud storage
Oruta ppt
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
Privacy preserving public auditing for secure cloud storage
Public integrity auditing for shared dynamic cloud data with group user revoc...
Secure erasure code based cloud storage system with secure data forwarding
Privacy preserving public auditing for secure cloud storage
data storage security technique for cloud computing
Towards secure and dependable storage service in cloud
secure data transfer and deletion from counting bloom filter in cloud computing.
Privacy preserving public auditing for secure cloud storage
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Ad

Similar to Homomorphic authentication with random masking technique ensuring privacy (20)

PDF
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
DOCX
Privacy preserving public auditing for secure cloud storage
DOCX
Privacy preserving public auditing for secure cloud storage
PDF
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
PDF
Iaetsd storage privacy protection against data
PDF
Privacy preserving public auditing for
PDF
Privacy preserving public auditing for secure cloud storage
PDF
Privacy preserving public auditing for data storage security in cloud comp
PDF
To Improve Data Storage Security Levels in the Cloud
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
PDF
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
PDF
Insuring Security for Outsourced Data Stored in Cloud Environment
PDF
50120140507005 2
PDF
50120140507005
PDF
Third Party Public Auditing Scheme for Security in Cloud Storage
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
PDF
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
PDF
L01246974
PDF
A Survey on Batch Auditing Systems for Cloud Storage
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Iaetsd storage privacy protection against data
Privacy preserving public auditing for
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for data storage security in cloud comp
To Improve Data Storage Security Levels in the Cloud
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
Insuring Security for Outsourced Data Stored in Cloud Environment
50120140507005 2
50120140507005
Third Party Public Auditing Scheme for Security in Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
L01246974
A Survey on Batch Auditing Systems for Cloud Storage
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Complications of Minimal Access Surgery at WLH
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Trump Administration's workforce development strategy
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Structure & Organelles in detailed.
PPTX
Pharma ospi slides which help in ospi learning
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Microbial disease of the cardiovascular and lymphatic systems
FourierSeries-QuestionsWithAnswers(Part-A).pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Final Presentation General Medicine 03-08-2024.pptx
Cell Types and Its function , kingdom of life
STATICS OF THE RIGID BODIES Hibbelers.pdf
Computing-Curriculum for Schools in Ghana
Complications of Minimal Access Surgery at WLH
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Final Presentation General Medicine 03-08-2024.pptx
Trump Administration's workforce development strategy
Supply Chain Operations Speaking Notes -ICLT Program
O5-L3 Freight Transport Ops (International) V1.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
RMMM.pdf make it easy to upload and study
Cell Structure & Organelles in detailed.
Pharma ospi slides which help in ospi learning
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF

Homomorphic authentication with random masking technique ensuring privacy

  • 1. HOMOMORPHIC AUTHENTICATION WITH RANDOM MASKING TECHNIQUE ENSURING PRIVACY & SECURITY IN CLOUD COMPUTING ABSTRACT Cloud computing may be defined as delivery of product rather than service. Cloud computing is a internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in cloud computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. So correctness of data and security is a prime concern. This article studies the problem of ensuring the integrity and security of data storage in Cloud Computing. Security in cloud is achieved by signing the data block before sending to the cloud. Signing is performed using algorithm which is more secure compared to other algorithms. To ensure the correctness of data, we consider an external auditor called as third party auditor (TPA), on behalf of the cloud user, to verify the integrity of the data stored in the cloud. By utilizing public key based homomorphism authenticator with random masking privacy preserving public auditing can be achieved. The technique of bilinear aggregate signature is used to achieve batch auditing. Batch auditing reduces the computation overhead. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient.
  • 2. ALGORITHM: BLS: Boneh–Lynn–Shacham Signing is performed using Boneh–Lynn–Shacham (BLS) algorithm which is more secure compared to other algorithms. To ensure the correctness of data, we consider an external auditor called as third party auditor (TPA), on behalf of the cloud user, to verify the integrity of the data stored in the cloud. By utilizing public key based homomorphic authenticator with random masking privacy preserving public auditing can be achieved. The technique of bilinear aggregate signature is used to achieve batch auditing. Batch auditing reduces the computation overhead. Extensive security and performance analysis shows the proposed schemes are provably secure MODULES: 1. System Model: Third Party Auditor (TPA): an optional TPA, who has expertise and capabilities that users may not have, is trusted to assess and expose risk of cloud storage services on behalf of the users upon request. 1. It supports an external auditor to audit the user’s outsourced data without learning knowledge on the data content. 2. Achieves batch auditing where multiple delegated auditing asks from different users can be performed simultaneously by the TPA. 3. Also supports dynamic operations on data blocks i.e. data update, append and delete.
  • 3. 2. File Retrieval and Error Recovery: Since our layout of file matrix is systematic, the user can reconstruct the original file by downloading the data vectors from the first m servers, assuming that they return the correct response values. Notice that our verification scheme is based on random spot-checking, so the storage correctness assurance is a probabilistic one. We can guarantee the successful file retrieval with high probability. On the other hand, whenever the data corruption is detected, the comparison of pre-computed tokens and received response values can guarantee the identification of misbehaving server(s). 3. Operations: (1) Update Operation In cloud data storage, sometimes the user may need to modify some data block(s) stored in the cloud, we refer this operation as data update. In other words, for all the unused tokens, the user needs to exclude every occurrence of the old data block and replace it with the new one. (2) Delete Operation Sometimes, after being stored in the cloud, certain data blocks may need to be deleted. The delete operation we are considering is a general one, in which user replaces the data block with zero or some special reserved data symbol. From this point of view, the delete operation is actually a special case of the data update operation, where the original data blocks can be replaced with zeros or some predetermined special blocks. (3) Append Operation
  • 4. In some cases, the user may want to increase the size of his stored data by adding blocks at the end of the data file, which we refer as data append. We anticipate that the most frequent append operation in cloud data storage is bulk append, in which the user needs to upload a large number of blocks (not a single block) at one time. EXISTING SYSTEM: The audit from TPA demands retrieval of user’s data, which should be prohibitive because it violates the privacy-preserving guarantee. Its communication and computation complexity are both linear with respect to the sampled data size, which may result in large communication overhead and time delay, especially when the bandwidth available between the TPA and the cloud server is limited. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services May not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. PROPOSED SYSTEM: We consider an external auditor called as third party auditor (TPA), on behalf of the cloud user, to verify the integrity of the data stored in the cloud. By utilizing public key based homomorphic authenticator with random masking privacy preserving public auditing can be achieved. The technique of bilinear aggregate signature is used to achieve batch auditing. Batch auditing reduces
  • 5. the computation overhead. Extensive security and performance analysis shows the proposed schemes are provably secure and highly efficient. We are going to tackle the problem of how to enable a privacy-preserving third-party auditing protocol, independent to data encryption in this paper. Besides, with the prevalence of Cloud Computing, a foreseeable increase of auditing tasks from different users may be delegated to TPA. Technical contribution in this paper is summarized as follows: 1. It supports an external auditor to audit the user’s outsourced data without learning knowledge on the data content. 2. Achieves batch auditing where multiple delegated auditing asks from different users can be performed simultaneously by the TPA. 3. Also supports dynamic operations on data blocks i.e. data update, append and delete.