SlideShare a Scribd company logo
A.Mahaboob Basha. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 11, ( Part -3) November 2016, pp.68-72
www.ijera.com 68 | P a g e
Integrity Privacy to Public Auditing for Shared Data in Cloud
Computing
A.Mahaboob Basha1
, P. Venkata Maheswara2
1
M.Tech Student, Dept. of CSE, KMMITS, Tirupati
2
Asst. Professor, Dept. of CSE, KMMITS, Tirupati
ABSTRACT
In cloud computing, many mechanisms have been proposed to allow not only a data owner itself but also a
public verifier to efficiently perform integrity checking without downloading the entire data from the cloud,
which is referred to as public auditing . In these mechanisms, data is divided into many small blocks, where
each block is independently signed by the owner; and a random combination of all the blocks instead of the
whole data is retrieved during integrity checking .However, public auditing for such shared data— while
preserving identity privacy — remains to be an open challenge. Here, we only consider how to audit the
integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is
created in the cloud and the membership of users in the group is not changed during data sharing. The original
user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another
interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user
can be added into the group and an existing group member can be revoked during data sharing.
Keywords: Cloud Computing, Data integrity, Public Auditing, Privacy Preserving.
I. INTRODUCTION
Cloud computing is Internet-based
computing, whereby shared resources, software, and
information are provided to computers and other
devices on demand. It describes a new supplement,
consumption, and delivery model for IT services
based on the Internet. It has been envisioned as the
next generation information technology (IT)
architecture for enterprises, due to its wide range of
unprecedented advantages in the IT history: on-
demand self-service, ubiquitous network access,
location independent resource pooling, rapid
resource elasticity, usage-based pricing and
transference of risk. As a disruptive technology with
profound implications, Cloud Computing is
transforming the very nature of how businesses use
information technology. One fundamental aspect of
this paradigm shifting is that data is being centralized
or outsourced to the Cloud. From users’ perspective,
including both individuals and IT enterprises, storing
data remotely to the cloud in a flexible on-demand
manner brings appealing benefits: relief of the
burden for storage management, universal data
access with location independence, and avoidance of
capital expenditure on hardware, software, and
personnel maintenances, etc.
As such services provided by cloud service
provider to cloud user, naturally the providers must
have and rather can have access to resources which
are used by the user. Among the reasons these access
are greatly required are for maintenance perspective.
As numbers of users are using such service provided
by cloud service provider then the infrastructure
ought to capable enough to support them and these
resources ought to be shared between numbers of
users. Data synchronization between number of
users, service availability, and availability of data via
any devices which includes browser facility make
cloud more attractive
Fig: System architecture
We believe that sharing data among
multiple users is perhaps one of the most engaging
features that motivates cloud storage. Therefore, it is
also necessary to ensure the integrity of shared data
in the cloud is correct. Existing public auditing
mechanisms can actually be extended to verify
shared data integrity [1]. However, a new significant
privacy issue introduced in the case of shared data
with the use of existing mechanisms is the leakage of
identity privacy to public verifiers
RESEARCH ARTICLE OPEN ACCESS
A.Mahaboob Basha. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 11, ( Part -3) November 2016, pp.68-72
www.ijera.com 69 | P a g e
Fig.1. Alice and Bob share a data file in the cloud,
and a public verifier audits shared data integrity with
existing mechanisms.
II. PROBLEM STATEMENT
In our model, privacy is accomplished by
allowing the parties to upload their data in multi
clouds and data is split into multiple parts so it gives
more protection
Scope: We are going to raise the privacy level of the
data owner and the confidentiality of the data in a
better way through the multiple cloud environment.
III. PROPOSED WORK
To enable the TPA efficiently and securely
verify shared data for a group of users, Oruta should
be designed to achieve following properties: (1)
Public Auditing: The third party auditor is able to
verify the integrity of shared data for a group of users
without retrieving the entire data. (2) Correctness:
The third party auditor is able to correctly detect
whether there is any corrupted block in shared data.
(3) Unforgeability: Only a user in the group can
generate valid verification information on shared
data. (4) Identity Privacy: During auditing, the TPA
cannot distinguish the identity of the signer on each
block in shared data.
Owner Registration: In this module an owner has to
upload its files in a cloud server, he/she should
register first. Then only he/she can be able to do it.
For that he needs to fill the details in the registration
form. These details are maintained in a database.
Owner Login: In this module,any of the above
mentioned person have to login,they should login by
giving their emailid and password .
User Registration: In this module if a user wants to
access the data which is stored in a cloud,he/she
should register their details first. These details are
maintained in a Database.
User Login: If the user is an authorized user,he/she
can download the file by using file id which has been
stored by data owner when it was uploading.
Third PartyAuditor Registration: In this module ,
if a third party auditor TPA(maintainer of clouds)
wants to do some cloud offer , they should register
first. Here we are doing like, this system allows only
three cloud service providers.
Third PartyAuditor Login: After third party
auditor gets logged in, He/ She can see how many
data owners have uploaded their files into the cloud.
Here we are providing three tpa for maintaining three
different clouds.
Data Sharing:
we only consider how to audit the integrity
of shared data in the cloud with static groups. It
means the group is pre-defined before shared data is
created in the cloud and the membership of users in
the group is not changed during data sharing. The
original user is responsible for deciding who is able
to share her data before outsourcing data to the
cloud. Another interesting problem is how to audit
the integrity of shared data in the cloud with dynamic
groups — a new user can be added into the group
and an existing group member can be revoked during
data sharing — while still preserving identity
privacy.
IV. PUBLIC AUDITING MECHANISM
Working Methodology:
System Architecture Preserving Storage
Data on Cloud using AES, Blowfish, SHA-1
Algorithm.
1. In our proposed methodology user store data to
cloud. At the time of sending data to cloud it get
encrypted by cryptographic algorithms.
2. That encrypted data transfer to the TPA.
3. TPA generates hash of that encrypted data.
4. That generated hash is stored along with TPA.
5. Then that encrypted data TPA will send to
cloud.
6. When user wants to check integrity of data then
user will send request to the TPA.
7. TPA forward that request to the cloud.
8. Cloud will generate the hash of requested file
and send that generated hash to the TPA.
9. TPA fetches stored hash of that requested file
and performs comparison in newly generated
hash and stored hash.
10. If both the hash are equal then TPA transfer
acknowledgement to the user. If both are equal
then acknowledgement will be that stored data is
as it is. If data get corrupted by cloud then
acknowledgement will be that your data is
corrupted.
11. Similarly, when user want to download data
from cloud then user send request to the TPA to
download data from cloud.TPA will transfer
request to the cloud. Cloud accepts that request
and send data to the user.
Ring Signature Scheme : As we introduce in this
sections, we intend to utilize ring signatures to hide
the identity of the signer on each block, so that
A.Mahaboob Basha. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 11, ( Part -3) November 2016, pp.68-72
www.ijera.com 70 | P a g e
private and sensitive information of the group is not
disclosed to public verifiers. However, traditional
ring signatures [1], [2] cannot be directly used into
public auditing mechanisms, because these ring
signature schemes do not support blockless
verifiability. Without blockless verifiability, a public
verifier has to download the whole data file to verify
the correctness of shared data, which consumes
excessive bandwidth and takes very long verification
times. Therefore, we design a new homomorphic
authenticable ring signature (HARS) scheme, which
is extended from a classic ring signature scheme
[21]. The ring signatures generated by HARS are not
only able to preserve identity privacy but also able to
support blockless verifi- ability. We will show how
to build the privacy-preserving public auditing
mechanism for shared data in the cloud based on this
new ring signature scheme in the next section.
HARS contains three algorithms: KeyGen,
RingSign and RingVerify. In KeyGen, each user in
the group generates his/her public key and private
key. In RingSign, a user in the group is able to
generate a signature on a block and its block
identifier with his/her private key and all the group
members’ public keys. A verifier is able to check
whether a given block is signed by a group member
in RingVerify. Details of this scheme are described.
Using HARS and its properties we
established in the previous section, we now construct
Oruta, a privacy-preserving public auditing
mechanism for shared data in the cloud. With Oruta,
the public verifier can verify the integrity of shared
data without retrieving the entire data. Meanwhile
the identity of the signer on each block in shared data
is kept private from the public verifier during the
auditing.
Fig. 2. Using indices as identifiers.
Fig. 3. Update block m1 and delete block m3 in
shared data using an index hash table as identifiers.
Supports for data dynamics: As information in
Cloud is dynamic, static auditing isn’t enough. A
dynamic auditing is required to verify the
information integrity of the dynamic data. However
as information square measure dynamic in cloud, it’s
dangerous to own associate degree auditing with
efficiency. Server will enforce Replay attack and
forge attack to fail the auditing method. The dynamic
operations embrace modification, insertion and
deletion. Whenever dynamic operation is performed,
the owner sends the update message to the auditor
representing the indicator of that message. The
Auditor updates the table. The message m and
therefore the tag square measure replaced by the new
message and tag in message modification. The new
message m and new tag square measure inserted in
insertion operation. The message m and tag square
measure deleted from the index table and every one
the entries below the deleted message move upwards.
After performing updates in the table, the auditor
conducts the data integrity test for the updated data.
Auditor sends the result to the owner and he deletes
the local copy of updated data.
V. CONCLUSION
A system of privacy preserving public
auditing provides security to data stored in cloud
storage. The cloud storage is advantageous than
earlier traditional storage system. In cloud storage
requirement is to provide security to data stored on
cloud. Our system uses encryption of data before
storing it on cloud. Therefore data will be secured on
cloud storage. The cloud user can check integrity of
their data stored on cloud server using TPA. The
TPA is able to efficiently audit the integrity of shared
data, yet cannot distinguish who is the signer on each
block, which can preserve identity privacy for users.
An interesting problem in our future work is how to
efficiently audit the integrity of shared data with
dynamic groups while still preserving the identity of
the signer on each block from the third party auditor.
REFERENCE
[1] Boyang Wang, Baochun Li, and Hui Li,
“Oruta: Privacy-Preserving Public Auditing
for Shared Data in the Cloud”IEEE
TRANSACTIONS ON CLOUD
COMPUTING,VOL. 2,NO. 1,JANUARY-
MARCH 2014.
[2] Miss. Pratiksha Meshram, Prof. Roshani
Talmale, and Prof. G. Rajesh babu ” A
System of Privacy Preserving Public
Auditing for Secure Cloud Storage System”
International Journal of Engineering
Research & Technology (IJERT) Vol. 3
Issue 8, August - 2014
A.Mahaboob Basha. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 11, ( Part -3) November 2016, pp.68-72
www.ijera.com 71 | P a g e
[3] D. Song, E. Shi, I. Fischer, and U. Shankar,
“Cloud Data Protection for the Masses,”
Computer, vol. 45, no. 1, pp. 39-45, 2012.
[4] C. Wang, Q. Wang, K. Ren, and W. Lou,
“Privacy-Preserving Public Auditing for
Data Storage Security in Cloud
Computing,” Proc. IEEE INFOCOM, pp.
525-533, 2010.
A.Mahaboob Basha. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 11, ( Part -3) November 2016, pp.68-72
www.ijera.com 72 | P a g e

More Related Content

PDF
Survey On: Auditing Public Clouds
PDF
Maintaining Data Integrity for Shared Data in Cloud
PDF
Oruta project report
DOC
Oruta privacy preserving public auditing
PDF
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
PDF
Centralized Data Verification Scheme for Encrypted Cloud Data Services
PDF
J018145862
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
Survey On: Auditing Public Clouds
Maintaining Data Integrity for Shared Data in Cloud
Oruta project report
Oruta privacy preserving public auditing
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
Centralized Data Verification Scheme for Encrypted Cloud Data Services
J018145862
Secure data sharing in cloud computing using revocable storage identity-based...

What's hot (19)

PPTX
Oruta ppt
DOC
Shared authority based privacy preserving authentication protocol in cloud co...
PDF
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
PDF
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
DOCX
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
DOCX
Oruta privacy preserving public auditing for shared data in the cloud
PDF
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
PDF
Shared authority based privacy preserving authentication protocol in cloud co...
PPTX
Panda public auditing for shared data with efficient user revocation in the c...
PPTX
Shared aythority ppt design [autosaved]
PDF
Public integrity auditing for shared dynamic cloud data with group user revoc...
PPT
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
PPT
Secure Data Sharing in Cloud (SDSC)
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
DOC
Oruta privacy preserving public auditing for shared data in the cloud
PDF
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
DOCX
A Novel privacy preserving public auditing for shared data in cloud
Oruta ppt
Shared authority based privacy preserving authentication protocol in cloud co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Shared authority based privacy preserving authentication protocol in cloud co...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Oruta privacy preserving public auditing for shared data in the cloud
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Shared authority based privacy preserving authentication protocol in cloud co...
Panda public auditing for shared data with efficient user revocation in the c...
Shared aythority ppt design [autosaved]
Public integrity auditing for shared dynamic cloud data with group user revoc...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Secure Data Sharing in Cloud (SDSC)
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
Oruta privacy preserving public auditing for shared data in the cloud
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
A Novel privacy preserving public auditing for shared data in cloud
Ad

Viewers also liked (20)

DOCX
Novela
PDF
Catalogo prodotti IT
PPT
Impementacija ADSL
PPT
9-11 класс. Основы химической термодинамики
PPTX
Remodeling of kitchen
PDF
Eastern ontario local food 2050 - Allan Douglas
PPTX
PPT
PPTX
Fer saos
PDF
11154330 오조은 비판의 음식
PDF
Oops Catalogue 2016_low res_v2
DOCX
Resumen -1
PPTX
Presentacion distrofia muscular
PDF
The municipal role in local food - Anne Marie Young
DOCX
Dia de muertoss
PPTX
La marcha
PPTX
Auvergne your new_world
PDF
Hub or not to hub - Bruce Moore
PPTX
Informatica michelle....pre sentacion
PPTX
Gerencia publica y privada
Novela
Catalogo prodotti IT
Impementacija ADSL
9-11 класс. Основы химической термодинамики
Remodeling of kitchen
Eastern ontario local food 2050 - Allan Douglas
Fer saos
11154330 오조은 비판의 음식
Oops Catalogue 2016_low res_v2
Resumen -1
Presentacion distrofia muscular
The municipal role in local food - Anne Marie Young
Dia de muertoss
La marcha
Auvergne your new_world
Hub or not to hub - Bruce Moore
Informatica michelle....pre sentacion
Gerencia publica y privada
Ad

Similar to Integrity Privacy to Public Auditing for Shared Data in Cloud Computing (20)

PDF
iaetsd Shared authority based privacy preserving protocol
DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
DOC
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
Attribute-Based Data Sharing
PDF
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
PDF
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
DOCX
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
PDF
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
PDF
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
Security Check in Cloud Computing through Third Party Auditor
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...
iaetsd Shared authority based privacy preserving protocol
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Secure Data Sharing In an Untrusted Cloud
Attribute-Based Data Sharing
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Enablingdatadynamicandindirectmutualtrustforcloudcomputingstoragesystems 1310...
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
A cloud storage system for sharing data securely with privacy preservation an...
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
Security Check in Cloud Computing through Third Party Auditor
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Enabling data dynamic and indirect mutu...

Recently uploaded (20)

PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
DOCX
573137875-Attendance-Management-System-original
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Well-logging-methods_new................
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Welding lecture in detail for understanding
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Digital Logic Computer Design lecture notes
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Mechanical Engineering MATERIALS Selection
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
573137875-Attendance-Management-System-original
bas. eng. economics group 4 presentation 1.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Lecture Notes Electrical Wiring System Components
Well-logging-methods_new................
OOP with Java - Java Introduction (Basics)
Welding lecture in detail for understanding
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Digital Logic Computer Design lecture notes
Model Code of Practice - Construction Work - 21102022 .pdf
Mechanical Engineering MATERIALS Selection
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Internet of Things (IOT) - A guide to understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS

Integrity Privacy to Public Auditing for Shared Data in Cloud Computing

  • 1. A.Mahaboob Basha. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 11, ( Part -3) November 2016, pp.68-72 www.ijera.com 68 | P a g e Integrity Privacy to Public Auditing for Shared Data in Cloud Computing A.Mahaboob Basha1 , P. Venkata Maheswara2 1 M.Tech Student, Dept. of CSE, KMMITS, Tirupati 2 Asst. Professor, Dept. of CSE, KMMITS, Tirupati ABSTRACT In cloud computing, many mechanisms have been proposed to allow not only a data owner itself but also a public verifier to efficiently perform integrity checking without downloading the entire data from the cloud, which is referred to as public auditing . In these mechanisms, data is divided into many small blocks, where each block is independently signed by the owner; and a random combination of all the blocks instead of the whole data is retrieved during integrity checking .However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. Here, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing. Keywords: Cloud Computing, Data integrity, Public Auditing, Privacy Preserving. I. INTRODUCTION Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. It describes a new supplement, consumption, and delivery model for IT services based on the Internet. It has been envisioned as the next generation information technology (IT) architecture for enterprises, due to its wide range of unprecedented advantages in the IT history: on- demand self-service, ubiquitous network access, location independent resource pooling, rapid resource elasticity, usage-based pricing and transference of risk. As a disruptive technology with profound implications, Cloud Computing is transforming the very nature of how businesses use information technology. One fundamental aspect of this paradigm shifting is that data is being centralized or outsourced to the Cloud. From users’ perspective, including both individuals and IT enterprises, storing data remotely to the cloud in a flexible on-demand manner brings appealing benefits: relief of the burden for storage management, universal data access with location independence, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc. As such services provided by cloud service provider to cloud user, naturally the providers must have and rather can have access to resources which are used by the user. Among the reasons these access are greatly required are for maintenance perspective. As numbers of users are using such service provided by cloud service provider then the infrastructure ought to capable enough to support them and these resources ought to be shared between numbers of users. Data synchronization between number of users, service availability, and availability of data via any devices which includes browser facility make cloud more attractive Fig: System architecture We believe that sharing data among multiple users is perhaps one of the most engaging features that motivates cloud storage. Therefore, it is also necessary to ensure the integrity of shared data in the cloud is correct. Existing public auditing mechanisms can actually be extended to verify shared data integrity [1]. However, a new significant privacy issue introduced in the case of shared data with the use of existing mechanisms is the leakage of identity privacy to public verifiers RESEARCH ARTICLE OPEN ACCESS
  • 2. A.Mahaboob Basha. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 11, ( Part -3) November 2016, pp.68-72 www.ijera.com 69 | P a g e Fig.1. Alice and Bob share a data file in the cloud, and a public verifier audits shared data integrity with existing mechanisms. II. PROBLEM STATEMENT In our model, privacy is accomplished by allowing the parties to upload their data in multi clouds and data is split into multiple parts so it gives more protection Scope: We are going to raise the privacy level of the data owner and the confidentiality of the data in a better way through the multiple cloud environment. III. PROPOSED WORK To enable the TPA efficiently and securely verify shared data for a group of users, Oruta should be designed to achieve following properties: (1) Public Auditing: The third party auditor is able to verify the integrity of shared data for a group of users without retrieving the entire data. (2) Correctness: The third party auditor is able to correctly detect whether there is any corrupted block in shared data. (3) Unforgeability: Only a user in the group can generate valid verification information on shared data. (4) Identity Privacy: During auditing, the TPA cannot distinguish the identity of the signer on each block in shared data. Owner Registration: In this module an owner has to upload its files in a cloud server, he/she should register first. Then only he/she can be able to do it. For that he needs to fill the details in the registration form. These details are maintained in a database. Owner Login: In this module,any of the above mentioned person have to login,they should login by giving their emailid and password . User Registration: In this module if a user wants to access the data which is stored in a cloud,he/she should register their details first. These details are maintained in a Database. User Login: If the user is an authorized user,he/she can download the file by using file id which has been stored by data owner when it was uploading. Third PartyAuditor Registration: In this module , if a third party auditor TPA(maintainer of clouds) wants to do some cloud offer , they should register first. Here we are doing like, this system allows only three cloud service providers. Third PartyAuditor Login: After third party auditor gets logged in, He/ She can see how many data owners have uploaded their files into the cloud. Here we are providing three tpa for maintaining three different clouds. Data Sharing: we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing — while still preserving identity privacy. IV. PUBLIC AUDITING MECHANISM Working Methodology: System Architecture Preserving Storage Data on Cloud using AES, Blowfish, SHA-1 Algorithm. 1. In our proposed methodology user store data to cloud. At the time of sending data to cloud it get encrypted by cryptographic algorithms. 2. That encrypted data transfer to the TPA. 3. TPA generates hash of that encrypted data. 4. That generated hash is stored along with TPA. 5. Then that encrypted data TPA will send to cloud. 6. When user wants to check integrity of data then user will send request to the TPA. 7. TPA forward that request to the cloud. 8. Cloud will generate the hash of requested file and send that generated hash to the TPA. 9. TPA fetches stored hash of that requested file and performs comparison in newly generated hash and stored hash. 10. If both the hash are equal then TPA transfer acknowledgement to the user. If both are equal then acknowledgement will be that stored data is as it is. If data get corrupted by cloud then acknowledgement will be that your data is corrupted. 11. Similarly, when user want to download data from cloud then user send request to the TPA to download data from cloud.TPA will transfer request to the cloud. Cloud accepts that request and send data to the user. Ring Signature Scheme : As we introduce in this sections, we intend to utilize ring signatures to hide the identity of the signer on each block, so that
  • 3. A.Mahaboob Basha. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 11, ( Part -3) November 2016, pp.68-72 www.ijera.com 70 | P a g e private and sensitive information of the group is not disclosed to public verifiers. However, traditional ring signatures [1], [2] cannot be directly used into public auditing mechanisms, because these ring signature schemes do not support blockless verifiability. Without blockless verifiability, a public verifier has to download the whole data file to verify the correctness of shared data, which consumes excessive bandwidth and takes very long verification times. Therefore, we design a new homomorphic authenticable ring signature (HARS) scheme, which is extended from a classic ring signature scheme [21]. The ring signatures generated by HARS are not only able to preserve identity privacy but also able to support blockless verifi- ability. We will show how to build the privacy-preserving public auditing mechanism for shared data in the cloud based on this new ring signature scheme in the next section. HARS contains three algorithms: KeyGen, RingSign and RingVerify. In KeyGen, each user in the group generates his/her public key and private key. In RingSign, a user in the group is able to generate a signature on a block and its block identifier with his/her private key and all the group members’ public keys. A verifier is able to check whether a given block is signed by a group member in RingVerify. Details of this scheme are described. Using HARS and its properties we established in the previous section, we now construct Oruta, a privacy-preserving public auditing mechanism for shared data in the cloud. With Oruta, the public verifier can verify the integrity of shared data without retrieving the entire data. Meanwhile the identity of the signer on each block in shared data is kept private from the public verifier during the auditing. Fig. 2. Using indices as identifiers. Fig. 3. Update block m1 and delete block m3 in shared data using an index hash table as identifiers. Supports for data dynamics: As information in Cloud is dynamic, static auditing isn’t enough. A dynamic auditing is required to verify the information integrity of the dynamic data. However as information square measure dynamic in cloud, it’s dangerous to own associate degree auditing with efficiency. Server will enforce Replay attack and forge attack to fail the auditing method. The dynamic operations embrace modification, insertion and deletion. Whenever dynamic operation is performed, the owner sends the update message to the auditor representing the indicator of that message. The Auditor updates the table. The message m and therefore the tag square measure replaced by the new message and tag in message modification. The new message m and new tag square measure inserted in insertion operation. The message m and tag square measure deleted from the index table and every one the entries below the deleted message move upwards. After performing updates in the table, the auditor conducts the data integrity test for the updated data. Auditor sends the result to the owner and he deletes the local copy of updated data. V. CONCLUSION A system of privacy preserving public auditing provides security to data stored in cloud storage. The cloud storage is advantageous than earlier traditional storage system. In cloud storage requirement is to provide security to data stored on cloud. Our system uses encryption of data before storing it on cloud. Therefore data will be secured on cloud storage. The cloud user can check integrity of their data stored on cloud server using TPA. The TPA is able to efficiently audit the integrity of shared data, yet cannot distinguish who is the signer on each block, which can preserve identity privacy for users. An interesting problem in our future work is how to efficiently audit the integrity of shared data with dynamic groups while still preserving the identity of the signer on each block from the third party auditor. REFERENCE [1] Boyang Wang, Baochun Li, and Hui Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”IEEE TRANSACTIONS ON CLOUD COMPUTING,VOL. 2,NO. 1,JANUARY- MARCH 2014. [2] Miss. Pratiksha Meshram, Prof. Roshani Talmale, and Prof. G. Rajesh babu ” A System of Privacy Preserving Public Auditing for Secure Cloud Storage System” International Journal of Engineering Research & Technology (IJERT) Vol. 3 Issue 8, August - 2014
  • 4. A.Mahaboob Basha. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 11, ( Part -3) November 2016, pp.68-72 www.ijera.com 71 | P a g e [3] D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data Protection for the Masses,” Computer, vol. 45, no. 1, pp. 39-45, 2012. [4] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, pp. 525-533, 2010.
  • 5. A.Mahaboob Basha. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 6, Issue 11, ( Part -3) November 2016, pp.68-72 www.ijera.com 72 | P a g e