SlideShare a Scribd company logo
Public Auditing of Data Stored in Cloud
by preserving privacy
Presented by,
Shima V M
Roll.No:15
Guided By
Mrs. Lekshmy D Kumar
Assistant Professor
INTRODUCTION
• Cloud computing is an Internet based computing which
enables sharing of services.
• Cloud computing makes computing and storage resources
available to users on demand
• Security in cloud is achieved by signing the data block before
sending to the cloud.
• Users should be able to just use the cloud storage as if it
is local, without worrying about the need to verify its
integrity.
INTRODUCTION(contd..)
• Public Auditing mechanism for secure cloud storage.
• Users can resort to a Third Party Auditor (TPA) to check
the integrity of outsourced data.
Architecture of Cloud Data Storage
OBJECTIVE
• To set up cloud environment using any available open source
cloud.
• To implement Public auditability on cloud data server.
– verify the integrity of the data cloud on demand without
having to retrieve a copy of all information
Literature Survey
• MAC based Solution
– Data owner maintains MACs for the data file to be
outsourced
– Integrity is checked by recalculating the MAC and compare
it with precomputed value
– For very large files MAC cannot be employed
• Proof of Retrievability scheme
– A keyed hash function is used in POR scheme
Literature Survey(contd..)
– Verifier pre-computes the cryptographic hash of file and
stores the hash as well as a secret key
– The verifier releases the secret key K to the cloud archive
– Asks cloud archive to compute and return the hash value of
file
• Cloud Security using TPA
– Uses RSA algorithm, for client data/file encryption and
decryptions
Literature Survey(contd..)
– Also uses SHA-512 which makes message digest and
check the data integrity
– Solves the problem of integrity, unauthorized access,
privacy and consistency
techniques and details
• The technique of providing more security by using the
Third Party Auditor (TPA) .
• Only the user knows the information about the data stored
in the cloud.
• When anyone tries to modify or steal the data TPA
informs the user by verifying the data.
• The TPA doesn’t even allows the CSP to read the data of
the user.
techniques and details
Modules
– KeyGen :- key generation algorithm that is run by the user to
setup the scheme.
– SigGen :- SigGen is used by the user to generate verification
metadata
– GenProof :- GenProof is run by the cloud server to generate a
proof of data storage correctness
– VerifyProof :- Run by the TPA to audit the proof.
techniques and details
• Two phases to construct public Auditing
• SetUp phase
– Achieve public and secret key parameters
– Verification metadata is sent to TPA
• Audit phase
– TPA sends audit message or challenge to the cloud
– Cloud executes GenProof on stored data file as response
– TPA retrieves the file tag for each user
Key Generation Process
Key Generation Process
• KeyGen Algorithm
– Client generates a random signing key pair(spk,ssk)
– Choose random ‘x’ which is an positive integer and ‘u’ є G1
– Compute v=(gx)
– Secret parametre sk=(x,ssk)
– Public parametre pk=(spk,v,g,u)
SigGen Process
SigGen Process
• sigGen Process
– Data file F=(m1,m2….mn)
– Compute authenticator Ϭi=H(Wi).umi)x, Wi=name||i
– For each block there is an authenticator form the set of
authenticators denoted as Φ
– Compute the file tag t=Encrypt(hash(name)) using secret key ssk
– User sends Φ,t to server as well as to the TPA
GenProof Process
GenProof Process
VerifyProof Process
VerifyProof Process
• TPA runs VerifyProof to validate it by computing the aggregate
authenticator
• Verifies µ and R values send by the server
• If the values matches the file in the server is not corrupted
Auditing using Multicast Batch RSA
• Sender chooses two large prime numbers P and Q
• Calculate N=P*Q
• Calculate two exponents e,d such that e*d=1modΦ(N) where
Φ(N)=(P-1)(Q-1)
• Calculate authenticator for each block and aggregate authenticator is
denoted as σ
• Verification is done using
Screen shots
Screen shots
Screen shots
Screen shots
Screen shots
Screen shots
Screen shots
Screen shots
Screen shots
Summary
• In this system a way for providing security to cloud storage by
maintaining data integrity and privacy preserving.
• Homomorphic linear authenticator with random masking to
provide the guarantee data privacy.
• The users data leakage is prevented.
• A mobile message alert has been implemented to enhance
security.
Summary
• In this system a way for providing security to cloud storage by
maintaining data integrity and privacy preserving.
• Homomorphic linear authenticator with random masking to
provide the guarantee data privacy.
• The users data leakage is prevented.
• Auditing is further enhanced by using Multicast RSA batch
authentication scheme
List of publications
• Shima V M and Lekshmy D Kumar “Public Auditing of Data stored in
Cloud by Preserving Privacy” International Journal of Engineering and
Advanced Technology (IJEAT), Vol. 4, August 2015.
• Shima V M and Lekshmy D Kumar A Survey on “Privacy Preserving Public
Auditing for Security of Data” International Journal of Computer and
Advanced Engineering Research (IJCAER), Vol. 2, April 2015.
• Shima V M and Jayasudha J S “A survey on Deduplication File System for
Virtual Machine Images” International Journal of Technology
Enhancement and Emerging (IJTEEE), Vol. 3, July 2015.
REFERENCES
• [1] Cong Wang,Qian Wang,Kui Ren,Wenjing Lou(2010) ”Privacy
Preserving Public Auditing for Data Storage Security in Cloud
Computing”.
• [2] Patrick Honer. ”Cloud Computing security requirements and
• solutions: A systematic literature review”
• [3] Jachak K.B, Korde S.K, Ghorpade P.P and Gagare G.J. ”Homomorphic
authentication with random masking technique ensuring privacy and security in
cloud computing.”
• [4] Sunil Sanka1, Chittaranjan Hota1, Muttukrishnan Rajarajan2 ”Secure Data
Access in Cloud Computing”
Thank You

More Related Content

PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
DOCX
Privacy preserving public auditing for secure cloud storage
DOC
Oruta privacy preserving public auditing for shared data in the cloud
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
PPT
Privacy preserving public auditing for secure cloud storage
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
DOCX
Oruta privacy preserving public auditing for shared data in the cloud
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for secure cloud storage
Oruta privacy preserving public auditing for shared data in the cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
Oruta privacy preserving public auditing for shared data in the cloud

What's hot (20)

PDF
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
PPTX
Oruta ppt
DOC
Oruta privacy preserving public auditing
DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Privacy preserving public auditing for regenerating code based cloud storage
PPTX
cloud computing preservity
PPT
Privacy preserving public auditing for regenerating-code-based
PDF
Privacy preserving public auditing for secure cloud storage
PDF
Oruta project report
PPT
DOCX
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
PPTX
Ensuring Distributed Accountability for Data Sharing in the Cloud
PDF
Public integrity auditing for shared dynamic cloud data with group user revoc...
PPTX
Secure erasure code based cloud storage system with secure data forwarding
PPTX
DOC
Ensuring distributed accountability for data sharing in the cloud
PPT
Secure Data Sharing in Cloud (SDSC)
PPTX
Panda public auditing for shared data with efficient user revocation in the c...
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Oruta ppt
Oruta privacy preserving public auditing
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy Preserving Public Auditing for Data Storage Security in Cloud
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Privacy preserving public auditing for regenerating code based cloud storage
cloud computing preservity
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for secure cloud storage
Oruta project report
PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVO...
Ensuring Distributed Accountability for Data Sharing in the Cloud
Public integrity auditing for shared dynamic cloud data with group user revoc...
Secure erasure code based cloud storage system with secure data forwarding
Ensuring distributed accountability for data sharing in the cloud
Secure Data Sharing in Cloud (SDSC)
Panda public auditing for shared data with efficient user revocation in the c...
Ad

Viewers also liked (12)

PPTX
Analysis of-security-algorithms-in-cloud-computing [autosaved]
PPT
Sample PPT
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PPTX
Data storage security in cloud computing
PPTX
Storage on cloud using dynamic encryption
PDF
Classification of secure encrypted relationaldata in cloud computing
PPTX
Cloud computing and security final
PDF
Secure Computing in Enterprise Cloud Environments
PPTX
Cryptography
PPTX
multiple encryption in clouud computing
PPTX
Cloud Encryption
PPTX
Cloud computing and security 03
Analysis of-security-algorithms-in-cloud-computing [autosaved]
Sample PPT
Secure data sharing in cloud computing using revocable storage identity-based...
Data storage security in cloud computing
Storage on cloud using dynamic encryption
Classification of secure encrypted relationaldata in cloud computing
Cloud computing and security final
Secure Computing in Enterprise Cloud Environments
Cryptography
multiple encryption in clouud computing
Cloud Encryption
Cloud computing and security 03
Ad

Similar to Privacy preserving public auditing (20)

PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
PDF
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
PDF
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
PDF
Iaetsd storage privacy protection against data
PDF
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
PDF
To Improve Data Storage Security Levels in the Cloud
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOCX
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
DOCX
Privacy preserving public auditing for secure cloud storage
PDF
Homomorphic authentication with random masking technique ensuring privacy
DOCX
Privacy preserving public auditing for secure cloud storage
PDF
Insuring Security for Outsourced Data Stored in Cloud Environment
PPTX
211880_Litterature Review.pptx
PDF
Privacy preserving external auditing for data storage security in cloud
PDF
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
PDF
Privacy preserving public auditing for data storage security in cloud comp
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
IJSRED-V2I5P16
PDF
Ijarcet vol-2-issue-7-2236-2240
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Iaetsd storage privacy protection against data
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
To Improve Data Storage Security Levels in the Cloud
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing for ...
Privacy preserving public auditing for secure cloud storage
Homomorphic authentication with random masking technique ensuring privacy
Privacy preserving public auditing for secure cloud storage
Insuring Security for Outsourced Data Stored in Cloud Environment
211880_Litterature Review.pptx
Privacy preserving external auditing for data storage security in cloud
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Privacy preserving public auditing for data storage security in cloud comp
Preserving Privacy Policy- Preserving public auditing for data in the cloud
IJSRED-V2I5P16
Ijarcet vol-2-issue-7-2236-2240

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Weekly Chronicles - August'25 Week I
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
Modernizing your data center with Dell and AMD
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
NewMind AI Monthly Chronicles - July 2025
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation

Privacy preserving public auditing

  • 1. Public Auditing of Data Stored in Cloud by preserving privacy Presented by, Shima V M Roll.No:15 Guided By Mrs. Lekshmy D Kumar Assistant Professor
  • 2. INTRODUCTION • Cloud computing is an Internet based computing which enables sharing of services. • Cloud computing makes computing and storage resources available to users on demand • Security in cloud is achieved by signing the data block before sending to the cloud. • Users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity.
  • 3. INTRODUCTION(contd..) • Public Auditing mechanism for secure cloud storage. • Users can resort to a Third Party Auditor (TPA) to check the integrity of outsourced data.
  • 4. Architecture of Cloud Data Storage
  • 5. OBJECTIVE • To set up cloud environment using any available open source cloud. • To implement Public auditability on cloud data server. – verify the integrity of the data cloud on demand without having to retrieve a copy of all information
  • 6. Literature Survey • MAC based Solution – Data owner maintains MACs for the data file to be outsourced – Integrity is checked by recalculating the MAC and compare it with precomputed value – For very large files MAC cannot be employed • Proof of Retrievability scheme – A keyed hash function is used in POR scheme
  • 7. Literature Survey(contd..) – Verifier pre-computes the cryptographic hash of file and stores the hash as well as a secret key – The verifier releases the secret key K to the cloud archive – Asks cloud archive to compute and return the hash value of file • Cloud Security using TPA – Uses RSA algorithm, for client data/file encryption and decryptions
  • 8. Literature Survey(contd..) – Also uses SHA-512 which makes message digest and check the data integrity – Solves the problem of integrity, unauthorized access, privacy and consistency
  • 9. techniques and details • The technique of providing more security by using the Third Party Auditor (TPA) . • Only the user knows the information about the data stored in the cloud. • When anyone tries to modify or steal the data TPA informs the user by verifying the data. • The TPA doesn’t even allows the CSP to read the data of the user.
  • 10. techniques and details Modules – KeyGen :- key generation algorithm that is run by the user to setup the scheme. – SigGen :- SigGen is used by the user to generate verification metadata – GenProof :- GenProof is run by the cloud server to generate a proof of data storage correctness – VerifyProof :- Run by the TPA to audit the proof.
  • 11. techniques and details • Two phases to construct public Auditing • SetUp phase – Achieve public and secret key parameters – Verification metadata is sent to TPA • Audit phase – TPA sends audit message or challenge to the cloud – Cloud executes GenProof on stored data file as response – TPA retrieves the file tag for each user
  • 13. Key Generation Process • KeyGen Algorithm – Client generates a random signing key pair(spk,ssk) – Choose random ‘x’ which is an positive integer and ‘u’ є G1 – Compute v=(gx) – Secret parametre sk=(x,ssk) – Public parametre pk=(spk,v,g,u)
  • 15. SigGen Process • sigGen Process – Data file F=(m1,m2….mn) – Compute authenticator Ϭi=H(Wi).umi)x, Wi=name||i – For each block there is an authenticator form the set of authenticators denoted as Φ – Compute the file tag t=Encrypt(hash(name)) using secret key ssk – User sends Φ,t to server as well as to the TPA
  • 19. VerifyProof Process • TPA runs VerifyProof to validate it by computing the aggregate authenticator • Verifies µ and R values send by the server • If the values matches the file in the server is not corrupted
  • 20. Auditing using Multicast Batch RSA • Sender chooses two large prime numbers P and Q • Calculate N=P*Q • Calculate two exponents e,d such that e*d=1modΦ(N) where Φ(N)=(P-1)(Q-1) • Calculate authenticator for each block and aggregate authenticator is denoted as σ • Verification is done using
  • 30. Summary • In this system a way for providing security to cloud storage by maintaining data integrity and privacy preserving. • Homomorphic linear authenticator with random masking to provide the guarantee data privacy. • The users data leakage is prevented. • A mobile message alert has been implemented to enhance security.
  • 31. Summary • In this system a way for providing security to cloud storage by maintaining data integrity and privacy preserving. • Homomorphic linear authenticator with random masking to provide the guarantee data privacy. • The users data leakage is prevented. • Auditing is further enhanced by using Multicast RSA batch authentication scheme
  • 32. List of publications • Shima V M and Lekshmy D Kumar “Public Auditing of Data stored in Cloud by Preserving Privacy” International Journal of Engineering and Advanced Technology (IJEAT), Vol. 4, August 2015. • Shima V M and Lekshmy D Kumar A Survey on “Privacy Preserving Public Auditing for Security of Data” International Journal of Computer and Advanced Engineering Research (IJCAER), Vol. 2, April 2015. • Shima V M and Jayasudha J S “A survey on Deduplication File System for Virtual Machine Images” International Journal of Technology Enhancement and Emerging (IJTEEE), Vol. 3, July 2015.
  • 33. REFERENCES • [1] Cong Wang,Qian Wang,Kui Ren,Wenjing Lou(2010) ”Privacy Preserving Public Auditing for Data Storage Security in Cloud Computing”. • [2] Patrick Honer. ”Cloud Computing security requirements and • solutions: A systematic literature review” • [3] Jachak K.B, Korde S.K, Ghorpade P.P and Gagare G.J. ”Homomorphic authentication with random masking technique ensuring privacy and security in cloud computing.” • [4] Sunil Sanka1, Chittaranjan Hota1, Muttukrishnan Rajarajan2 ”Secure Data Access in Cloud Computing”