SlideShare a Scribd company logo
Panda: Public Auditing for 
Shared Data with 
Efficient User Revocation in 
the Cloud 
Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE
Abstract 
With data storage and sharing services in the cloud, users can easily modify and share data as a group. 
To ensure shared data integrity can be verified publicly, users in the group need to compute signatures 
on all the blocks in shared data. Different blocks in shared data are generally signed by different users 
due to data modifications performed by different users. For security reasons, once a user is revoked 
from the group, the blocks which were previously signed by this revoked user must be re-signed by an 
existing user. The straightforward method, which allows an existing user to download the 
corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large 
size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the 
integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy re-signatures, 
we allow the cloud to re-sign blocks on behalf of existing users during user revocation, so 
that existing users do not need to download and re-sign blocks by themselves. In addition, a public 
verifier is always able to audit the integrity of shared data without retrieving the entire data from the 
cloud, even if some part of shared data has been re-signed by the cloud. Moreover, our mechanism is 
able to support batch auditing by verifying multiple auditing tasks simultaneously. Experimental results 
show that our mechanism can significantly improve the efficiency of user revocation.
Existing System 
An existing system the file uploaded in cloud which not signed by user in each time of 
upload. So that integrity of shared data is not possible in existing system. However, 
since the cloud is not in the same trusted domain with each user in the group, 
outsourcing every user’s private key to the cloud would introduce significant security 
issue.
Disadvantages of Existing System 
 For security reasons, when a user leaves the group or misbehaves, this user must 
be revoked from the group. As a result, this revoked user should no longer be able 
to access and modify shared data, and the signatures generated by this revoked 
user are no longer valid to the group. 
 Since shared data is outsourced to the cloud and users no longer store it on local 
devices, a straightforward method to re-compute these signatures during user 
revocation.
Proposed System 
In our Proposed system may lie to verifiers about the incorrectness of shared data in 
order to save the reputation of its data services and avoid losing money on its data 
services. In addition, we also assume there is no collusion between the cloud and any 
user during the design of our mechanism. Generally, the incorrectness of share data 
under the above semi trusted model can be introduced by hardware/software failures 
or human errors happened in the cloud. Considering these factors, users do not fully 
trust the cloud with the integrity of shared data.
Advantages of Proposed System 
 Blocking User account . 
 Security question. 
 Login with secret key in each time.
Architecture
Modules 
User Module: 
User module can divided into the following sub modules: 
 Registration 
 File Upload 
 Download 
 Re-upload 
 Unblock 
Auditor Module: 
Auditor module can divided into the following sub modules: 
 File Verification 
 View File 
Admin Module: 
Admin module can divided into the following sub modules: 
 View Files 
 Block user
Module Description 
User Module 
 Registration: In this module each user register his user details for using files. Only 
registered user can able to login in cloud server . 
 File Upload: In this module user upload a block of files in the cloud with encryption 
by using his secret key. This ensure the files to be protected from unauthorized 
user.
 Download: This module allows the user to download the file using his secret key to decrypt the 
downloaded data of blocked user and verify the data and re-upload the block of file into cloud server 
with encryption .This ensure the files to be protected from unauthorized user. 
 Re-upload: This module allow the user to re-upload the downloaded files of blocked user 
into cloud server with resign the files (i.e) the files is uploaded with new signature like new secret with 
encryption to protected the data from unauthorized user. 
 Unblock: This module allow the user to unblock his user account by answering his security question 
regarding to answer that provided by his at the time of registration. Once the answer is matched to the 
answer of registration time answer then only account will be unlocked.
 Auditor Module 
 File Verification: The public verifier is able to correctly check the integrity of shared 
data. The public verifier can audit the integrity of shared data without retrieving the 
entire data from the cloud, even if some blocks in shared data have been re-signed 
by the cloud. 
 Files View: In this module public auditor view the all details of upload, download, 
blocked user, re-upload.
 Admin Module 
 View Files: In this module public auditor view the all details of upload, download, 
blocked user, re-upload. 
 Block User: In this module admin block the misbehave user account to protect the 
integrity of shared data.
Minimum Hardware Configuration of the 
Proposed System 
 Processor : Intel/AMD 
 Hard Disk : 40 GB 
 Monitor : 14’ Colour Monitor 
 Mouse : Optical Mouse 
 RAM : 512 MB
Software Configuration of the Proposed 
System 
 Operating system : Windows 7 and above 
 Coding Language : ASP.Net with C# 
 Data Base : SQL Server 2008
References 
 B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revoation 
in the Cloud,” in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912. 
 M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. 
Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” 
Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010. 
 G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, 
“Provable Data Possession at Untrusted Stores,” in the Proceedings of ACM CCS 2007, 
2007, pp. 598–610. 
 H. Shacham and B. Waters, “Compact Proofs of Retrievability,” in the Proceedings of 
ASIACRYPT 2008. Springer-Verlag,2008,pp. 90–107. 
 C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud 
Computing,” in the Proceedings of ACM/IEEE IWQoS 2009, 2009, pp. 1–9.

More Related Content

PPTX
Panda public auditing for shared data with efficient user revocation in the c...
DOCX
panda public auditing for shared data with efficient user revocation in the c...
DOCX
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PDF
Public integrity auditing for shared dynamic cloud data with group user revoc...
PDF
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
DOC
Oruta privacy preserving public auditing
DOCX
Oruta privacy preserving public auditing for shared data in the cloud
Panda public auditing for shared data with efficient user revocation in the c...
panda public auditing for shared data with efficient user revocation in the c...
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Public integrity auditing for shared dynamic cloud data with group user revoc...
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Oruta privacy preserving public auditing
Oruta privacy preserving public auditing for shared data in the cloud

What's hot (20)

PPTX
cloud computing preservity
DOC
Oruta privacy preserving public auditing for shared data in the cloud
PDF
Maintaining Data Integrity for Shared Data in Cloud
PPTX
Privacy preserving public auditing
PDF
Oruta project report
DOCX
Privacy preserving public auditing for secure cloud storage
PPTX
Oruta ppt
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Maintaining Data Integrity for Shared Data in Cloud
DOCX
secure data transfer and deletion from counting bloom filter in cloud computing.
PDF
Towards Secure and Dependable Storage Services in Cloud Computing
PDF
ORUTA BASE PAPER
PPT
PPT
Towards secure and dependable storage service in cloud
PPT
Secure Data Sharing in Cloud (SDSC)
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PPTX
Towards secure and dependable storage
PDF
Secure Authorised De-duplication using Convergent Encryption Technique
PDF
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
PDF
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
cloud computing preservity
Oruta privacy preserving public auditing for shared data in the cloud
Maintaining Data Integrity for Shared Data in Cloud
Privacy preserving public auditing
Oruta project report
Privacy preserving public auditing for secure cloud storage
Oruta ppt
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Maintaining Data Integrity for Shared Data in Cloud
secure data transfer and deletion from counting bloom filter in cloud computing.
Towards Secure and Dependable Storage Services in Cloud Computing
ORUTA BASE PAPER
Towards secure and dependable storage service in cloud
Secure Data Sharing in Cloud (SDSC)
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Towards secure and dependable storage
Secure Authorised De-duplication using Convergent Encryption Technique
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revoc...
Panda: Public Auditing for Shared Data with Efficient User Revocation in the ...
Ad

Viewers also liked (10)

PPTX
Efficient authentication for mobile and pervasive computing
PPTX
Access control in decentralized online social networks applying a policy hidi...
PDF
M.tech ieee 2014 15 electrical&electronics&power electronics&vlsi
PPTX
Privacy preserving optimal meeting location determination on mobile devices
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Be ieee 2014 15 computer&inforamation science&mca titles
PPTX
A system for denial of-service attack detection based on multivariate correla...
PPTX
A cloud environment for backup and data storage
PPTX
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Captcha as graphical passwords a new security primitive based on hard ai prob...
Efficient authentication for mobile and pervasive computing
Access control in decentralized online social networks applying a policy hidi...
M.tech ieee 2014 15 electrical&electronics&power electronics&vlsi
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving multi-keyword ranked search over encrypted cloud data
Be ieee 2014 15 computer&inforamation science&mca titles
A system for denial of-service attack detection based on multivariate correla...
A cloud environment for backup and data storage
Decentralized access control with anonymous authentication of data stored in ...
Captcha as graphical passwords a new security primitive based on hard ai prob...
Ad

Similar to Panda public auditing for shared data with efficient user revocation in the cloud (20)

PDF
Ieeepro techno solutions 2014 ieee java project -panda public auditing for ...
DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
DOC
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
DOC
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
DOC
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
DOCX
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PDF
A secure anti collusion data sharing scheme for dynamic groups in the cloud
PPTX
Secure data sharing for dynamic groups in multi-owner using cloud
PDF
Survey On: Auditing Public Clouds
PPTX
Mona final review
PDF
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PDF
Secured Authorized Deduplication Based Hybrid Cloud
PDF
E031102034039
PDF
A self destruction system for dynamic group data sharing in cloud
PDF
CSE-05-27-34
PPTX
secure multi-owner data sharing for dynamic groups
PPTX
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Ieeepro techno solutions 2014 ieee java project -panda public auditing for ...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Oruta privacy preserving public audit...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
Mona secure multi owner data sharing for dynamic groups in the cloud
831 panda public-auditing-for-shared-data-with-efficient-user-revocation-in-t...
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
Secure data sharing for dynamic groups in multi-owner using cloud
Survey On: Auditing Public Clouds
Mona final review
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Mona secure multi owner data sharing for dynamic groups in the cloud
Secured Authorized Deduplication Based Hybrid Cloud
E031102034039
A self destruction system for dynamic group data sharing in cloud
CSE-05-27-34
secure multi-owner data sharing for dynamic groups
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...

More from IGEEKS TECHNOLOGIES (20)

PDF
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
PDF
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
PDF
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
PDF
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
PDF
IEEE 2017-18 Final Year Project List
PDF
Diploma 2016 17 electronics & electrical titles
PDF
Final year project titles 2017 2018
PDF
Final year project titles 2017 2018
PDF
BE Mechanical Engineering Final Year Academic Projects Bangalore
PDF
final year diploma projects training institutes bangalore
PPTX
Secure data retrieval for decentralized disruption tolerant military networks
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPTX
Lbp based edge-texture features for object recoginition
PPTX
Supporting privacy protection in personalized web search
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPTX
Lbp based edge-texture features for object recoginition
PPTX
Dealing with concept drifts in process mining
PPTX
Captcha as graphical passwords a new security primitive based on hard ai prob...
PPTX
A cloud enviroment for backup and data storage
PPTX
Handoop training in bangalore
BE CS,IS FINAL YEAR PROJECT LIST FOR ACADEMIC YEAR 2019-2020
CIVIL ENGINEERING PROJECT LIST FOR 2019-2020
BE,ME MECHANICAL DESIGN AND THERMAL BASED PROJECTS 2019-2020
BE ECE,EEE,BIO MEDICAL,INSTRUMENTATION PROJECT TITLES FOR 2019-20220
IEEE 2017-18 Final Year Project List
Diploma 2016 17 electronics & electrical titles
Final year project titles 2017 2018
Final year project titles 2017 2018
BE Mechanical Engineering Final Year Academic Projects Bangalore
final year diploma projects training institutes bangalore
Secure data retrieval for decentralized disruption tolerant military networks
Privacy preserving multi-keyword ranked search over encrypted cloud data
Lbp based edge-texture features for object recoginition
Supporting privacy protection in personalized web search
Privacy preserving multi-keyword ranked search over encrypted cloud data
Lbp based edge-texture features for object recoginition
Dealing with concept drifts in process mining
Captcha as graphical passwords a new security primitive based on hard ai prob...
A cloud enviroment for backup and data storage
Handoop training in bangalore

Recently uploaded (20)

PPTX
Institutional Correction lecture only . . .
PPTX
Pharma ospi slides which help in ospi learning
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Complications of Minimal Access Surgery at WLH
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
01-Introduction-to-Information-Management.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Pre independence Education in Inndia.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Cell Types and Its function , kingdom of life
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Institutional Correction lecture only . . .
Pharma ospi slides which help in ospi learning
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
RMMM.pdf make it easy to upload and study
Complications of Minimal Access Surgery at WLH
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
O7-L3 Supply Chain Operations - ICLT Program
01-Introduction-to-Information-Management.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Pre independence Education in Inndia.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Sports Quiz easy sports quiz sports quiz
Final Presentation General Medicine 03-08-2024.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Insiders guide to clinical Medicine.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
VCE English Exam - Section C Student Revision Booklet
Cell Types and Its function , kingdom of life
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

Panda public auditing for shared data with efficient user revocation in the cloud

  • 1. Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE
  • 2. Abstract With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy re-signatures, we allow the cloud to re-sign blocks on behalf of existing users during user revocation, so that existing users do not need to download and re-sign blocks by themselves. In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud, even if some part of shared data has been re-signed by the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing tasks simultaneously. Experimental results show that our mechanism can significantly improve the efficiency of user revocation.
  • 3. Existing System An existing system the file uploaded in cloud which not signed by user in each time of upload. So that integrity of shared data is not possible in existing system. However, since the cloud is not in the same trusted domain with each user in the group, outsourcing every user’s private key to the cloud would introduce significant security issue.
  • 4. Disadvantages of Existing System  For security reasons, when a user leaves the group or misbehaves, this user must be revoked from the group. As a result, this revoked user should no longer be able to access and modify shared data, and the signatures generated by this revoked user are no longer valid to the group.  Since shared data is outsourced to the cloud and users no longer store it on local devices, a straightforward method to re-compute these signatures during user revocation.
  • 5. Proposed System In our Proposed system may lie to verifiers about the incorrectness of shared data in order to save the reputation of its data services and avoid losing money on its data services. In addition, we also assume there is no collusion between the cloud and any user during the design of our mechanism. Generally, the incorrectness of share data under the above semi trusted model can be introduced by hardware/software failures or human errors happened in the cloud. Considering these factors, users do not fully trust the cloud with the integrity of shared data.
  • 6. Advantages of Proposed System  Blocking User account .  Security question.  Login with secret key in each time.
  • 8. Modules User Module: User module can divided into the following sub modules:  Registration  File Upload  Download  Re-upload  Unblock Auditor Module: Auditor module can divided into the following sub modules:  File Verification  View File Admin Module: Admin module can divided into the following sub modules:  View Files  Block user
  • 9. Module Description User Module  Registration: In this module each user register his user details for using files. Only registered user can able to login in cloud server .  File Upload: In this module user upload a block of files in the cloud with encryption by using his secret key. This ensure the files to be protected from unauthorized user.
  • 10.  Download: This module allows the user to download the file using his secret key to decrypt the downloaded data of blocked user and verify the data and re-upload the block of file into cloud server with encryption .This ensure the files to be protected from unauthorized user.  Re-upload: This module allow the user to re-upload the downloaded files of blocked user into cloud server with resign the files (i.e) the files is uploaded with new signature like new secret with encryption to protected the data from unauthorized user.  Unblock: This module allow the user to unblock his user account by answering his security question regarding to answer that provided by his at the time of registration. Once the answer is matched to the answer of registration time answer then only account will be unlocked.
  • 11.  Auditor Module  File Verification: The public verifier is able to correctly check the integrity of shared data. The public verifier can audit the integrity of shared data without retrieving the entire data from the cloud, even if some blocks in shared data have been re-signed by the cloud.  Files View: In this module public auditor view the all details of upload, download, blocked user, re-upload.
  • 12.  Admin Module  View Files: In this module public auditor view the all details of upload, download, blocked user, re-upload.  Block User: In this module admin block the misbehave user account to protect the integrity of shared data.
  • 13. Minimum Hardware Configuration of the Proposed System  Processor : Intel/AMD  Hard Disk : 40 GB  Monitor : 14’ Colour Monitor  Mouse : Optical Mouse  RAM : 512 MB
  • 14. Software Configuration of the Proposed System  Operating system : Windows 7 and above  Coding Language : ASP.Net with C#  Data Base : SQL Server 2008
  • 15. References  B. Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revoation in the Cloud,” in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912.  M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010.  G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” in the Proceedings of ACM CCS 2007, 2007, pp. 598–610.  H. Shacham and B. Waters, “Compact Proofs of Retrievability,” in the Proceedings of ASIACRYPT 2008. Springer-Verlag,2008,pp. 90–107.  C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” in the Proceedings of ACM/IEEE IWQoS 2009, 2009, pp. 1–9.