SlideShare a Scribd company logo
Prof: Bhawana Dakhare .et.al.Int. Journal of Engineering Research and Application www.ijera.com
ISSN: 2248-9622, Vol. 7, Issue 4, (Part -1) April 2017, pp.01-03
www.ijera.com DOI: 10.9790/9622-0704010103 1 | P a g e
Maintaining Data Integrity for Shared Data in Cloud
Prof: Bhawana Dakhare, Miss. Mrunal M.Ruke , Miss. Supriya Gore,
Miss. Supriya Chavan
Bharati Vidyapeeth College Of Engineering Sector-7,C.B.D,Belpada,Navi Mumbai-400614, India
ABSTRACT
Cloud computing is defined as a type of computing that relies on sharing computing resources rather than
having local servers or personal devices to handle the applications. User can easily modify the shared and stored
data in the cloud. To overcome this data modification in cloud the signature is provided to each individual user
who accesses the data in cloud. Once the data is modified by the user on a block, the user must ensure that the
signature is provided on that specific block. When user misbehaves or misuses the system the admin has
authority to revoke that particular user from the group. After revoking that user, the existing user must re-sign
the data signed by the revoked user. In addition to this, the security of the data is also enhanced with the help of
public Auditor who is always able to audit the integrity of shared data without retrieving the entire data from the
cloud.
Index Terms:Cloud computing, public Auditor, revoke user.
I. INTRODUCTION
People can easily work together in a group
by Sharing and storing the services in the cloud.
More specifically, once a user creates shared data in
the cloud, every user in the group is able to not only
access and modify shared data, but also share the
latest version of the shared data with the rest of the
group. To protect the integrity of data in the cloud,
number of mechanisms have been proposed. In these
mechanisms, a signature is attached to each block in
data, and the integrity of data relies on the
correctness of all the signatures. One of the most
significant and common features of these
mechanisms is to allow a Public Auditor to
efficiently check data integrity in the cloud without
downloading the entire data, referred to as public
auditing. This Public Auditor could be a client who
would like to utilize cloud data for particular
purposes (e.g., search, computation, data mining,
etc.) or Third Party Auditor(TPA) who is able to
provide verification services on data integrity to
users. With shared data, once a user modifies a
block, that user also needs to compute a new
signature for the modified block. Due to the
modifications from different users, different blocks
are signed by different users. For security reasons,
when a user leaves the group or misbehaves, this
user must be revoked from the group. As a result,
this revoked user should no longer be able to access
and modify shared data, and the signatures generated
by this revoked user are no longer valid to the group.
Therefore, although the content of shared data is not
changed during user revocation, the blocks, which
were previously signed by the revoked user, still
need to be re-signed by an existing user in the group.
As a result, the integrity of the entire data can still be
verified with the public keys of existing users only.
II. LITRATURE SURVEY
Qian Wang et.al. [1] has proposed a model
to solve the problem of integrity of data stored in the
cloud. The TPA has allowed verifying data in cloud
storage through auditing process and motivating
public auditing system in the cloud. TPA check the
outsourced data integrity. The advantages of
auditing are to detect, prevent errors and maintain
the database regularly. Auditing should not bring
any new vulnerabilities towards privacy of data.
Based on the proxy re-signature method designs a
public auditing scheme for data storage with
proficient user revocation in cloud. The original user
can acts as a group manager and able to retract the
users if necessary. For each block of data to be
stored in cloud server, data owner is assigned with a
signature and the integrity of data relies in the
correctness of all the signatures.In a cloud if a user
modifies a single block including insertion or
deletion, the index of the modified block is changed
and the user needs to compute a new signature for
the modified block. User access the modified data
with the new signature generated to perform. For
security reasons, when a user leaves the group or
misbehaves, user is revoked from the group. As a
result, this revoked user should no longer able to
access and modify shared data, and the signatures
generated by this revoked user are no longer valid to
the group users. Therefore the content of shared data
is not changed during user revocation, the blocks
which were previously signed by the revoked user,
still need to be re-signed by an existing user in the
group. during user revocation, an existing user need
RESEARCH ARTICLE OPEN ACCESS
Prof: Bhawana Dakhare .et.al.Int. Journal of Engineering Research and Application www.ijera.com
ISSN: 2248-9622, Vol. 7, Issue 4, (Part -1) April 2017, pp.01-03
www.ijera.com DOI: 10.9790/9622-0704010103 2 | P a g e
to first download the blocks previously signed by the
revoked user, verify the correctness of these blocks,
then re-sign these blocks, and finally upload the new
signatures to the cloud.[4] The authors Buying Wang
et.al [4] has envisioned that data can be easily shared
by group. Proxy re-signature technique was utilized
with help of this method and the user can resign the
revoked user block and need not to download data
from server to verify the shared data integrity and
also maintain the whole data integrity.
III. PROBLEM STATEMENT
Many public auditing mechanisms were
introduced for efficient integrity checking. During
public auditing method it fails to preserve the
identity privacy on shared data and results in reviling
significant confidential information to Public
Auditor. In existing system once the user is revoked
from the system, the blocks which were previously
signed by this revoked user used to be re-signed with
the help of straightforward method. In which the
public auditor asked to existing user to first
download the blocks previously signed by the
revoked user, then it verifies the correctness of the
blocks, then re-sign these blocks and finally upload
the resignature to the cloud. This method cause huge
amount of communication and computation
resources by downloading and verifying the blocks.
but the content of the block remains same. This
method is insecure because the private data of
revoked user is misused by an existing user. The
proposed mechanism allows a public Auditor to
efficiently check the data integrity in the cloud
without downloading the entire data. This
mechanism preserves the confidentiality of the
shared data by using the proxy resignature
mechanism. In this mechanism the blocks which
were previously assign to revoked user will be re-
signed by the existing user. For the security purpose
secret key will be provided while login. 3.SYSTEM
MODEL In this proposed system the sharing of data
between users in a group with highly secure manner
in the cloud. An authorized member in a group must
access the shared data using HMAC algorithm .
During user revocation the block which were
priioiusly signed by revoke user will be re-sign by
an existing user in the group. Also the public verifier
is able to verify the integrity of shared data without
retrieving the entire data from the cloud.The
Integrity of the data can be verified by using SHA- 1
algorithm. Identity of the signer on each block in
shared data is kept private from the public verifier.
This method also supports a novel public auditing
mechanism for the integrity of shared data with
efficient user revocation in cloud.
The System consists of the following module.
A. User Module
User module can be divided into the following sub
modules:
1.Registration
2.File upload
3.Download
4.Re-upload
B. Auditor Module
Auditor Module can be divided into the following
sub modules:
1.File Verification
2. View Verification Status
C. Owner Module
Owner Module can be divided into the following sub
modules:
1.View Files
2.Revoke User
IV. SECURITY MODEL
A. For Signature Generation:
Prof: Bhawana Dakhare .et.al.Int. Journal of Engineering Research and Application www.ijera.com
ISSN: 2248-9622, Vol. 7, Issue 4, (Part -1) April 2017, pp.01-03
www.ijera.com DOI: 10.9790/9622-0704010103 3 | P a g e
For generating signature on the blocks
we have used Hmac algorithm. Hash-based
message authentication code (HMAC) provides the
server and the client each with a public and private
key. The public key is known, but the private key is
known only to that specific server and that specific
client. The client creates a unique HMAC, or hash,
per request to the server by combing the request data
and hashing that data, along with a private key and
sending it as part of a request. The server receives the
request and regenerates its own unique HMAC. The
server compares the two HMACs, and, if they're
equal, the client is trusted and the request is executed.
HMAC can then be expressed:
1. Append zeros to the left end of K to create a b-
bit string K+ (for example, if K is of length 160
bits and b = 512, then K will be appended with
44 zero bytes 0x00).
2. XOR (bitwise exclusive OR) K+ with ipad to
produce theb-bit block Si.
3. Append M to Si.
4. Apply H to the stream generated in Step 3.
5. XOR K+ with opad to produce the b-bit block
So.
6. Append the hash result from Step 4 to So.
7. Apply H to the stream generated in Step 6 and
output theresult.
B Integrity Verification:
For verifying the data integrity SHA-1 algorithm is
used. SHA-1 stands for Secure Hash algorithm. The
following figure shows basic basic hash function.
V. CONCLUSION ”
Maintaining Data Integrity for Shared Data in
cloud” is required where, the cloud offers data storage
and sharing services to the group. By using the service
user can easily modify and share the confidential data
in the system. To restrict the data modification the
signature is assigned on each block of the data. Due to
which user will able to modify or access the data by
the permission of the owner of the data. If user tries to
misuses the data in system, the data owner has
authority to revoke that user from the group and by
using proxy re-signature mechanism the signature on
the data blocks of revoked user is overridden by the
new signature. This helps in preserving the security of
the system.To extent the security the secret key is also
provided to the user at the time of login. In addition to
this ,The security of the data is also enhanced with the
help of public verifier, who is always able to audit the
integrity of shared data without retrieving the entire
data from the cloud.
REFERENCES
[1]. Q.Wang, C.Wang,J. Li,K. Ren, W. Lou
Enabling Public Verifiability and Data
Dynamic for Storage Security in Cloud
Computing,”4epp. 355-370
[2]. Boyang Wang, Baochun Li, Hui Li, ” Panda:
Public Auditing for Shared Data with Efficient
User Revocation in the Cloud” IEEE Trans.
[3]. International Research Journal of Engineering
and Technology (IRJET) ,”Public Auditing For
Shared Data with efficient manner in cloud”, In
the preceding of irjet,- ISSN: e-ISSN: 2395 -
0056 Volume: 02 Issue: 09 | Dec-2015
[4]. B. Wang, B. Li, and H. Li, “Public Auditing for
Shared Data with Efficient User Revocation in
the Cloud,” in the Proceedings of IEEE
INFOCOM 2013, 2013, pp. 2904–2912
[5]. International Journal of Scientific Engineering
and Applied Science (IJSEAS), “Effective
Privacy-Preserving Public Auditing for Data
Sharing in Cloud” , In the preceding of ijseas, -
ISSN: 2395-3470 Volume-1, Issue-4| July-2015

More Related Content

PDF
Maintaining Data Integrity for Shared Data in Cloud
PDF
ORUTA BASE PAPER
PDF
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
PDF
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
PPTX
Panda public auditing for shared data with efficient user revocation in the c...
PDF
Survey On: Auditing Public Clouds
DOCX
Oruta privacy preserving public auditing for shared data in the cloud
PDF
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Maintaining Data Integrity for Shared Data in Cloud
ORUTA BASE PAPER
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Panda public auditing for shared data with efficient user revocation in the c...
Survey On: Auditing Public Clouds
Oruta privacy preserving public auditing for shared data in the cloud
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...

What's hot (18)

PDF
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
DOCX
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PDF
Public integrity auditing for shared dynamic cloud data with group user revoc...
PDF
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
DOC
Oruta privacy preserving public auditing
DOC
Oruta privacy preserving public auditing for shared data in the cloud
PDF
m-Privacy for Collaborative Data Publishing
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
PDF
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PDF
Oruta project report
PDF
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
PDF
Oruta privacy preserving public auditing for shared data in the cloud1
PDF
Secure Access to Outsourced Databases
147bc3d2e2ffdb1c4f10d673600dd786.Maintaining Integrity and Security for the D...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta privacy preserving public auditing
Oruta privacy preserving public auditing for shared data in the cloud
m-Privacy for Collaborative Data Publishing
Public integrity auditing for shared dynamic cloud data with group user revoc...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
A cloud storage system for sharing data securely with privacy preservation an...
Oruta project report
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
Oruta privacy preserving public auditing for shared data in the cloud1
Secure Access to Outsourced Databases
Ad

Similar to Maintaining Data Integrity for Shared Data in Cloud (20)

PDF
Ieeepro techno solutions 2014 ieee java project -panda public auditing for ...
PDF
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
DOCX
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
DOCX
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
DOC
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
PPTX
Panda public auditing for shared data with efficient user revocation in the c...
PDF
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
PDF
CSE-05-27-34
PDF
Oruta privacy preserving public auditing
PDF
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
PDF
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
PDF
Homomorphic authentication with random masking technique ensuring privacy
DOC
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
DOCX
panda public auditing for shared data with efficient user revocation in the c...
PDF
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
DOCX
JPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
PDF
public truthfulness assessment for shared active cloud data storage with grou...
PDF
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
Ieeepro techno solutions 2014 ieee java project -panda public auditing for ...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
Panda public auditing for shared data with efficient user revocation in the c...
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
CSE-05-27-34
Oruta privacy preserving public auditing
Ieeepro techno solutions ieee java project - oruta privacy-preserving public...
Ieeepro techno solutions ieee dotnet project - oruta privacy-preserving publ...
Homomorphic authentication with random masking technique ensuring privacy
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
panda public auditing for shared data with efficient user revocation in the c...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
JPJ1409 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
public truthfulness assessment for shared active cloud data storage with grou...
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
Ad

Recently uploaded (20)

PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Welding lecture in detail for understanding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPT
Project quality management in manufacturing
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
additive manufacturing of ss316l using mig welding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CH1 Production IntroductoryConcepts.pptx
Welding lecture in detail for understanding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Arduino robotics embedded978-1-4302-3184-4.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Structs to JSON How Go Powers REST APIs.pdf
Project quality management in manufacturing
Operating System & Kernel Study Guide-1 - converted.pdf
Lecture Notes Electrical Wiring System Components
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
UNIT-1 - COAL BASED THERMAL POWER PLANTS
OOP with Java - Java Introduction (Basics)
additive manufacturing of ss316l using mig welding

Maintaining Data Integrity for Shared Data in Cloud

  • 1. Prof: Bhawana Dakhare .et.al.Int. Journal of Engineering Research and Application www.ijera.com ISSN: 2248-9622, Vol. 7, Issue 4, (Part -1) April 2017, pp.01-03 www.ijera.com DOI: 10.9790/9622-0704010103 1 | P a g e Maintaining Data Integrity for Shared Data in Cloud Prof: Bhawana Dakhare, Miss. Mrunal M.Ruke , Miss. Supriya Gore, Miss. Supriya Chavan Bharati Vidyapeeth College Of Engineering Sector-7,C.B.D,Belpada,Navi Mumbai-400614, India ABSTRACT Cloud computing is defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle the applications. User can easily modify the shared and stored data in the cloud. To overcome this data modification in cloud the signature is provided to each individual user who accesses the data in cloud. Once the data is modified by the user on a block, the user must ensure that the signature is provided on that specific block. When user misbehaves or misuses the system the admin has authority to revoke that particular user from the group. After revoking that user, the existing user must re-sign the data signed by the revoked user. In addition to this, the security of the data is also enhanced with the help of public Auditor who is always able to audit the integrity of shared data without retrieving the entire data from the cloud. Index Terms:Cloud computing, public Auditor, revoke user. I. INTRODUCTION People can easily work together in a group by Sharing and storing the services in the cloud. More specifically, once a user creates shared data in the cloud, every user in the group is able to not only access and modify shared data, but also share the latest version of the shared data with the rest of the group. To protect the integrity of data in the cloud, number of mechanisms have been proposed. In these mechanisms, a signature is attached to each block in data, and the integrity of data relies on the correctness of all the signatures. One of the most significant and common features of these mechanisms is to allow a Public Auditor to efficiently check data integrity in the cloud without downloading the entire data, referred to as public auditing. This Public Auditor could be a client who would like to utilize cloud data for particular purposes (e.g., search, computation, data mining, etc.) or Third Party Auditor(TPA) who is able to provide verification services on data integrity to users. With shared data, once a user modifies a block, that user also needs to compute a new signature for the modified block. Due to the modifications from different users, different blocks are signed by different users. For security reasons, when a user leaves the group or misbehaves, this user must be revoked from the group. As a result, this revoked user should no longer be able to access and modify shared data, and the signatures generated by this revoked user are no longer valid to the group. Therefore, although the content of shared data is not changed during user revocation, the blocks, which were previously signed by the revoked user, still need to be re-signed by an existing user in the group. As a result, the integrity of the entire data can still be verified with the public keys of existing users only. II. LITRATURE SURVEY Qian Wang et.al. [1] has proposed a model to solve the problem of integrity of data stored in the cloud. The TPA has allowed verifying data in cloud storage through auditing process and motivating public auditing system in the cloud. TPA check the outsourced data integrity. The advantages of auditing are to detect, prevent errors and maintain the database regularly. Auditing should not bring any new vulnerabilities towards privacy of data. Based on the proxy re-signature method designs a public auditing scheme for data storage with proficient user revocation in cloud. The original user can acts as a group manager and able to retract the users if necessary. For each block of data to be stored in cloud server, data owner is assigned with a signature and the integrity of data relies in the correctness of all the signatures.In a cloud if a user modifies a single block including insertion or deletion, the index of the modified block is changed and the user needs to compute a new signature for the modified block. User access the modified data with the new signature generated to perform. For security reasons, when a user leaves the group or misbehaves, user is revoked from the group. As a result, this revoked user should no longer able to access and modify shared data, and the signatures generated by this revoked user are no longer valid to the group users. Therefore the content of shared data is not changed during user revocation, the blocks which were previously signed by the revoked user, still need to be re-signed by an existing user in the group. during user revocation, an existing user need RESEARCH ARTICLE OPEN ACCESS
  • 2. Prof: Bhawana Dakhare .et.al.Int. Journal of Engineering Research and Application www.ijera.com ISSN: 2248-9622, Vol. 7, Issue 4, (Part -1) April 2017, pp.01-03 www.ijera.com DOI: 10.9790/9622-0704010103 2 | P a g e to first download the blocks previously signed by the revoked user, verify the correctness of these blocks, then re-sign these blocks, and finally upload the new signatures to the cloud.[4] The authors Buying Wang et.al [4] has envisioned that data can be easily shared by group. Proxy re-signature technique was utilized with help of this method and the user can resign the revoked user block and need not to download data from server to verify the shared data integrity and also maintain the whole data integrity. III. PROBLEM STATEMENT Many public auditing mechanisms were introduced for efficient integrity checking. During public auditing method it fails to preserve the identity privacy on shared data and results in reviling significant confidential information to Public Auditor. In existing system once the user is revoked from the system, the blocks which were previously signed by this revoked user used to be re-signed with the help of straightforward method. In which the public auditor asked to existing user to first download the blocks previously signed by the revoked user, then it verifies the correctness of the blocks, then re-sign these blocks and finally upload the resignature to the cloud. This method cause huge amount of communication and computation resources by downloading and verifying the blocks. but the content of the block remains same. This method is insecure because the private data of revoked user is misused by an existing user. The proposed mechanism allows a public Auditor to efficiently check the data integrity in the cloud without downloading the entire data. This mechanism preserves the confidentiality of the shared data by using the proxy resignature mechanism. In this mechanism the blocks which were previously assign to revoked user will be re- signed by the existing user. For the security purpose secret key will be provided while login. 3.SYSTEM MODEL In this proposed system the sharing of data between users in a group with highly secure manner in the cloud. An authorized member in a group must access the shared data using HMAC algorithm . During user revocation the block which were priioiusly signed by revoke user will be re-sign by an existing user in the group. Also the public verifier is able to verify the integrity of shared data without retrieving the entire data from the cloud.The Integrity of the data can be verified by using SHA- 1 algorithm. Identity of the signer on each block in shared data is kept private from the public verifier. This method also supports a novel public auditing mechanism for the integrity of shared data with efficient user revocation in cloud. The System consists of the following module. A. User Module User module can be divided into the following sub modules: 1.Registration 2.File upload 3.Download 4.Re-upload B. Auditor Module Auditor Module can be divided into the following sub modules: 1.File Verification 2. View Verification Status C. Owner Module Owner Module can be divided into the following sub modules: 1.View Files 2.Revoke User IV. SECURITY MODEL A. For Signature Generation:
  • 3. Prof: Bhawana Dakhare .et.al.Int. Journal of Engineering Research and Application www.ijera.com ISSN: 2248-9622, Vol. 7, Issue 4, (Part -1) April 2017, pp.01-03 www.ijera.com DOI: 10.9790/9622-0704010103 3 | P a g e For generating signature on the blocks we have used Hmac algorithm. Hash-based message authentication code (HMAC) provides the server and the client each with a public and private key. The public key is known, but the private key is known only to that specific server and that specific client. The client creates a unique HMAC, or hash, per request to the server by combing the request data and hashing that data, along with a private key and sending it as part of a request. The server receives the request and regenerates its own unique HMAC. The server compares the two HMACs, and, if they're equal, the client is trusted and the request is executed. HMAC can then be expressed: 1. Append zeros to the left end of K to create a b- bit string K+ (for example, if K is of length 160 bits and b = 512, then K will be appended with 44 zero bytes 0x00). 2. XOR (bitwise exclusive OR) K+ with ipad to produce theb-bit block Si. 3. Append M to Si. 4. Apply H to the stream generated in Step 3. 5. XOR K+ with opad to produce the b-bit block So. 6. Append the hash result from Step 4 to So. 7. Apply H to the stream generated in Step 6 and output theresult. B Integrity Verification: For verifying the data integrity SHA-1 algorithm is used. SHA-1 stands for Secure Hash algorithm. The following figure shows basic basic hash function. V. CONCLUSION ” Maintaining Data Integrity for Shared Data in cloud” is required where, the cloud offers data storage and sharing services to the group. By using the service user can easily modify and share the confidential data in the system. To restrict the data modification the signature is assigned on each block of the data. Due to which user will able to modify or access the data by the permission of the owner of the data. If user tries to misuses the data in system, the data owner has authority to revoke that user from the group and by using proxy re-signature mechanism the signature on the data blocks of revoked user is overridden by the new signature. This helps in preserving the security of the system.To extent the security the secret key is also provided to the user at the time of login. In addition to this ,The security of the data is also enhanced with the help of public verifier, who is always able to audit the integrity of shared data without retrieving the entire data from the cloud. REFERENCES [1]. Q.Wang, C.Wang,J. Li,K. Ren, W. Lou Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,”4epp. 355-370 [2]. Boyang Wang, Baochun Li, Hui Li, ” Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud” IEEE Trans. [3]. International Research Journal of Engineering and Technology (IRJET) ,”Public Auditing For Shared Data with efficient manner in cloud”, In the preceding of irjet,- ISSN: e-ISSN: 2395 - 0056 Volume: 02 Issue: 09 | Dec-2015 [4]. B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912 [5]. International Journal of Scientific Engineering and Applied Science (IJSEAS), “Effective Privacy-Preserving Public Auditing for Data Sharing in Cloud” , In the preceding of ijseas, - ISSN: 2395-3470 Volume-1, Issue-4| July-2015